RAP as a Service (RaaS) Prerequisites
Download RAP as a Service Prerequisites – Microsoft Download Center – Download Details
Viewed 47357 times by 3189 viewers
While the Internet is an amazing resource in terms of the information you can find and things you can do today, it’s important to also be smart about how you browse. A browser can be a great tool in helping you stay safe when you go online.
Most online attacks fall into one of the three situations:
1. Malware that relies on social engineering to spread
2. Attacks directed against your browser or your operating system
3. Attacks directed towards the websites you visit
Let me spend some time describing what I mean by each of these, and also how Internet Explorer can help protect you from each of these types of attacks.
Helping Protect You from Socially Engineered Attacks
A term that you may hear on occasion within the security realm is “socially engineered attacks.” What this means is an attacker uses clever techniques to get you to lower your guard and trick you into doing something that makes you vulnerable to an attack. The idea here is that they aren’t looking for weaknesses in code; rather, they’re trying to fool you into a trap.
The ways in which we see this play out are varied; it may be that you get spam – that is to say an email from a fake bank that actually takes you to a malicious site, or an email supposedly from a friend that encourages you to download a file which may contain malware. To help keep you safe from such types of attacks, Internet Explorer comes with the Smart Screen filter technology, which has been improved even more with Internet Explorer 9. SmartScreen makes it harder for someone to trick you into opening a malicious page, or con you with a phishing site. This technology checks to see if the site you’re visiting is suspected of hosting malicious code and subsequently prevents you from continuing on to that page. Internet Explorer 9 goes one step further by warning you only when you download applications that may be of higher risk.
Technologies like this can make a big difference in helping to keep you safe online. In December, NSS Labs reported that Internet Explorer offers the best protection against the spread of socially-engineered malware. As you can see in the below chart, Internet Explorer 8 (90%) and Internet Explorer 9 (99%) offer significantly more protection than other browsers.
Mitigating Attacks on Your Browser and PC
Internet Explorer also helps protect against deliberate attacks where bad code is hosted on a site that is designed to exploit weaknesses in the software on your PC. Among all the lines of code that make up software, there can be vulnerabilities. The Internet Explorer team designed its browser with security in mind, and in comparison to other browsers, Internet Explorer has fewer vulnerabilities. The chart below illustrates the number of publicly known vulnerabilities in 2010 divided by each browser, according to the National Vulnerability Database.
*Data source: National Vulnerability Database. Data is based upon the most recently shipped versions available during this time period. In the case of Chrome, versions 5, 6, 7, & 8 were all released during this time period.
At Microsoft, products are built with a secure-by-design approach, where security is designed into the product from the ground up. The result of this effort is a browser that includes specific features to help people stay secure and technologies that help insulate the browser against exploits. In addition to Microsoft’s security processes, which includes the Security Development Lifecycle, Software Security Incident Response Process (SSIRP), and monthly security bulletins, some ways in which you might see this at a product level include features such as Protected Mode, Data Execution Prevention, and many others, both in Internet Explorer 8, and the soon to be released Internet Explorer 9.
Protecting Against the Compromised Websites
This last scenario is when an attacker that has compromised a site that you visit in a way that interferes with how your browser relates to the site. This type of an attack is called a cross-site scripting attack. In this instance, an attacker gets an unsuspecting server to load special code on your browser that allows the attacker to do anything from monitoring your keystrokes to performing actions on your behalf on the site. Internet Explorer has built in a Cross-Site Script Filter that makes such attacks more difficult and helps protect you.
The upcoming release of Internet Explorer 9 contains even more features designed to help keep you safer such as ActiveX Filtering and Application Reputation. More information on how Microsoft technologies can keep you secure can be found here.
Viewed 44916 times by 3059 viewers
One of the features I’m most excited about with Xbox 360 is Xbox SmartGlass. While the focus is on tapping into the best entertainment providers right now, the possibilities for this digital canvas will be endless.
Viewed 10533 times by 1443 viewers
If you purchase or have purchased an eligible Windows 7 PC anytime between June 2, 2012 and January 31, 2013 you will be able to purchase an upgrade to Windows 8 Pro for only $14.99 (U.S.) which will be redeemable when Windows 8 is generally available on October 26th. If you’re still looking for a PC, check out some of our great Windows 7 PCs. Once you’ve purchased your PC you can come back and register for the offer.
Registration for the Windows Upgrade Offer is only for those who buy an eligible Windows 7 PC between June 2nd and January 31st, 2013.
Here is what you need to do to register for your $14.99 (U.S.) upgrade to Windows 8 Pro:
After buying your PC, go to the Windows Upgrade Offer website to register. It will ask you to select your country (details for the offer vary depending on country). You will then be asked to register with your personal details as well as information about your Windows 7 PC purchase – including date of purchase, retailer, and PC brand and model. You should also have your 25-digit Windows 7 product key that came with the PC handy as you may be required to enter this as part of the registration.
Then starting on October 26th, we will start sending out promo codes via email with purchase instructions. You will be directed to Windows.com where you will go through the online upgrade process with the Windows 8 Upgrade Assistant (shown above) as I have highlighted here in this blog post. Once you get to the purchase screen in the Windows 8 Upgrade Assistant, it will show the $39.99 upgrade price. However, on the order confirmation page you’ll have a chance to enter your promo code – that price will change to $14.99. Once you make your purchase, your download and upgrade installation begins!
You will have until February 28, 2013 to register for the offer to get Windows 8 Pro for $14.99.
If you experience any issues or have questions – you can click the contact support link at the top of the Windows Upgrade Offer website.
Did you already buy an awesome Windows 7 PC prior to June 2nd (or have a Windows 7 PC not eligible for the offer)? Not to worry! Starting on October 26th, you will be able to upgrade to Windows 8 Pro for $39.99!
Both the Windows Upgrade Offer and $39.99 upgrade promotion is available in 140 countries worldwide, with 37 supported languages, and 23 supported currencies (we’ve added 9 additional countries over the original 131!).
Viewed 6789 times by 1240 viewers
• Designed for Microsoft Partners, early adopters, and experienced IT Pros/ITDMs familiar with Microsoft server technologies • All twelve (12) modules are under an hour and packed with engaging discussion and real-world demos — watch them all!
Links to Every Module from this Jump Start The HD-quality video recordings of this course are published to TechNet Edge and are highly recommended. Windows Server 2012 is a game-changing release for so many reasons and this course will help experienced IT Pros truly understand why — check it out!
• Windows Server 2012 Jump Start
• Windows Server 2012 Jump Start (02a): Virtualization Infrastructure, Part 1 • Windows Server 2012 Jump Start (02b): Virtualization Infrastructure, Part 2 • Windows Server 2012 Jump Start (03a): Storage Architecture, Part 1 • Windows Server 2012 Jump Start (03b): Storage Architecture, Part 2 • Windows Server 2012 Jump Start (04): Continuous Availability • Windows Server 2012 Jump Start (05a): Multi-Server Management, Part 1 • Windows Server 2012 Jump Start (05b): Multi-Server Management, Part 2 • Windows Server 2012 Jump Start (06a): Security and Access, Part 1 • Windows Server 2012 Jump Start (06b): Security and Access, Part 2 • Windows Server 2012 Jump Start (07): Remote Connectivity and Networking • Windows Server 2012 Jump Start (08): IIS, DHCP and IPAM
Viewed 6740 times by 1203 viewers
Windows Management Framework 3.0 makes some updated management functionality available to be installed on Windows 7 SP1, Windows Server 2008 R2 SP1 & Windows Server 2008 SP2. Windows Management Framework 3.0 contains Windows PowerShell 3.0, WMI & WinRM. Windows PowerShell 3.0Some of the new features in Windows PowerShell 3.0 include:
- Workflow Windows PowerShell Workflow lets IT Pros and developers apply the benefits of workflows to the automation capabilities of Windows PowerShell. Workflows allow administrators to run long-running tasks (which can be made repeatable, frequent, parallelizable, interruptible, or restart-able) that can affect multiple managed computers or devices at the same time.
- Disconnected Sessions PowerShell sessions can be disconnected from the remote computer and reconnected later from the same computer or a different computer without losing state or causing running commands to fail.
- Robust Session Connectivity Remote sessions are resilient to network failures and will attempt to reconnect for several minutes. If connectivity cannot be reestablished, the session will automatically disconnect itself so that it can be reconnected when network connectivity is restored.
- Scheduled Jobs Scheduled jobs that run regularly or in response to an event.
- Delegated Administration Commands that can be executed with a delegated set of credentials so users with limited permissions can run critical jobs
- Simplified Language Syntax Simplified language syntax that make commands and scripts look a lot less like code and a lot more like natural language.
- Cmdlet Discovery Improved cmdlet discovery and automatic module loading that make it easier to find and run any of the cmdlets installed on your computer.
- Show-Command Show-Command, a cmdlet and ISE Add-On that helps users find the right cmdlet, view its parameters in a dialog box, and run it.
WMIWMI in Windows Management Framework 3.0 introduces:
- A new provider development model This new model brings down the cost of provider development and removes the dependency on COM.
- A new MI Client API to perform standard CIM operations. The API can be used to interact with any standard WsMan + CIMOM implementation, allowing management applications on Windows to manage non-Windows computers.
- The ability to write Windows PowerShell cmdlets in native code The new WMI Provider APIs supports an extended Windows PowerShell semantics API allowing you to provide rich Windows PowerShell semantics. e.g., Verbose, Error, Warning, WhatIf, Confirm, Progress
WinRMWith Windows Management Framework 3.0:
- Connections are more robust Remote connections communicating over WinRM are more robust to transient network failures such as a flaky WAN connection. In the case of a complete network failure, connections are gracefully disconnected and can be reconnected when network connectivity is restored.
- Remoting is more Standards-compliant Standard WS-Management operations, including Create and Delete, can be performed over WMI. Remoting for cmdlets written in native code using the new WMI provider development model uses WS-Management instead of DCOM.
- Multiple PowerShell sessions can be shared in the same process PowerShell sessions from the same user to the same session configuration (WinRM plug-in) can run in a single shared process instead of separate processes. This improves scalability and performance by allowing multiple sessions to share memory and other server resources.
Management OData IIS Extensions Management OData IIS Extension enables an administrator to expose a set of PowerShell cmdlets as a RESTful web endpoint accessible via the Open Data Protocol (OData). This enables Windows and non-Windows clients to discover and invoke PowerShell cmdlets remotely over standard web protocols and interfaces. Server Manager CIM Provider The Server Manager CIM Provider packaged with Windows Management Framework 3.0 allows you to manage your Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 servers from Server Manager in Windows Server 2012 or Remote Server Administration Tools for Windows 8
Viewed 8731 times by 1291 viewers
In advance of one of the most significant waves of product launches in Microsoft’s history, Microsoft is unveiling a new logo for the company.
Click logo for larger view or here for Print quality
The logo has two components: the logotype and the symbol. For the logotype, we are using the Segoe font which is the same font we use in our products as well as our marketing communications. The symbol is important in a world of digital motion (as demonstrated in the video above.) The symbol’s squares of color are intended to express the company’s diverse portfolio of products.
Starting today, you’ll see the new Microsoft logo being used prominently. It will be used on Microsoft.com – the 10th most visited website in the world. It is in three of our Microsoft retail stores today (Boston, Seattle’s University Village and Bellevue, Wash.) and will shine brightly in all our stores over the next few months. It will sign off all of our television ads globally. And it will support our products across various forms of marketing. Fully implementing a change like this takes time, so there may be other instances where you will see the old logo being used for some time.
Nice logo overview from Seattle Times
Viewed 4881 times by 768 viewers