Skip to main content

Trustworthy Computing

Microsoft Security Newsletter

Stay up to date with security insights, resources, best practices, and events for IT professionals and developers. Browse past newsletters or subscribe to get the latest news delivered to your inbox.

Subscribe

 

 
 
The last security newsletter of 2015 has arrived!

This month we’re talking about secure collaboration. Whenever I get the chance to talk to C-level executives about cybersecurity, one topic that inevitably comes up is Rights Management Services (RMS). This isn’t because they ask about the technology specifically, but because they ask me how they can protect sensitive information they need to share with other organizations. Many times they need to share information with their outside attorneys or marketing firms and the risk of a leak is worrisome. Once executives get an introduction to Azure RMS; however, they quickly realize it is exactly what they have been asking their IT department for. For a closer look at the amazing features of Azure RMS, please check out the article in our Cloud Security Controls Series I authored a few months ago and read on for additional guidance on Azure RMS, identity and access, and other aspects of security we know you are interested in.

Happy holidays!

Tim Rains Best regards,
Tim Rains, Chief Security Advisor
Enterprise Cybersecurity Group, Microsoft


Want to share this newsletter with a friend or colleague? Click here for the online edition and subscription options.
Have feedback on how we can improve this newsletter? Email us at secnlfb@microsoft.comand share your ideas.

 
Top Stories
 
Tracking Lateral Movement Part One: Special Groups and Specific Service Accounts
Lateral Movement is the moving of an attacker from one compromised host throughout your domain until they find what they are looking for, and is something we see many just about all attackers doing during compromise. Learn about some of the detective controls you can put in place to get greater insight into what is currently happening in your environment so you can get the protective controls in place faster.

 
Security Guidance
Azure Rights Management
Azure Rights Management is a cloud service, and is integrated into other Microsoft cloud services and applications, such as Office 365 and Azure Active Directory. However, it can also be used with your on-premises applications and services. Learn how to use Azure RMS to help you protect your organization’s sensitive information from unauthorized access, and control how this information is used.

Comparing Azure Rights Management and AD RMS
If you know or have previously deployed Active Directory Rights Management Services (AD RMS), you might be wondering how Azure RMS compares in terms of functionality and requirements. Use this handy table for a side-by-side comparison of the features and benefits of Azure RMS and AD RMS.

Securing Active Directory: An Overview of Best Practices
Find steps that your organization can take today to protect its Active Directory environment, a common target for external attacks.

Azure Active Directory
Learn about Microsoft’s multi-tenant cloud-based directory and identity management service, then delve into technical videos, step-by-step guides, and troubleshooting tips.

Securing Privileged Access
The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using credential theft attacks like Pass-the-Hash and Pass-the-Ticket. Check out this roadmap of recommendations for securing privileged access, a critical first step to establishing security assurances for business assets in a modern organization, then find recommendations on how to implement privileged access workstations and additional reference materials.

Single Sign-On Roadmap
Single sign-on (SSO) allows you and your users to access Microsoft cloud services with your Active Directory corporate credentials. Find a quick list of steps to help you prepare for SSO, set up your on-premises security token service, and set up directory synchronization.

Control the Health of Windows 10-Based Devices
With the increased use of BYOD, there are more unmanaged and potentially unhealthy systems accessing corporate services, internal resources, and cloud apps. This guide presents an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows 10-based devices.

Top Questions You Should Ask a Cloud Service Provider
Find questions to help you choose a cloud service provider that meets your security expectations, and learn how Microsoft Office 365 answers these questions.

 
This Month's Security Bulletins
 

December 2015 Security Bulletins

Critical

 
MS15-124:3116180 Cumulative Security Update for Internet Explorer
 
MS15-125:3116184 Cumulative Security Update for Microsoft Edge
 
MS15-126:3116178 Cumulative Security Update for JScript and VBScript to Address Remote Code Execution
 
MS15-127:3100465 Security Update for Microsoft Windows DNS to Address Remote Code Execution
 
MS15-128:3104503 Security Update for Microsoft Graphics Component to Address Remote Code Execution
 
MS15-129:3106614 Security Update for Silverlight to Address Remote Code Execution
 
MS15-130:3108670 Security Update for Microsoft Uniscribe to Address Remote Code Execution
 
MS15-131:3116111 Security Update for Microsoft Office to Address Remote Code Execution


Important

 
MS15-132:3116162 Security Update for Microsoft Windows to Address Remote Code Execution
 
MS15-133:3116130 Security Update for Windows PGM to Address Elevation of Privilege
 
MS15-134:3108669 Security Update for Windows Media Center to Address Remote Code Execution
 
MS15-135:3119075 Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege
 

December 2015 Security Bulletin Resources:

 
December 2015 Security Update Release Summary
Malicious Software Removal Tool: December 2015 Update


 
Security Events and Training
 
Windows Security & Forensics (Level 300)
Learn how to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion by recovering key intelligence from Windows systems.

Azure RMS Core Skills (Level 200)
Explore reasons to use RMS for information protection, find out how to active Azure RMS, and dive deep into how to protect the files your users share, and how to track and revoke the usage of protected files.

Add Identity into Your Cloud-Based Apps (Level 100)
Integrating with Azure AD can save you time from coding your own sign-in logic and trying to protect your users’ passwords and has many security and end user experience benefits. Learn the most common scenarios for integrating with Azure AD, get an overview of the Azure AD feature set, and find out what’s coming next.

 
 

Essential Tools

 
Microsoft Security Bulletins
 
Microsoft Security Advisories
 
Microsoft Security Development Lifecycle Starter Kit
 
Enhanced Mitigation Experience Toolkit
 
Malicious Software Removal Tool
 
Microsoft Baseline Security Analyzer
 

Security Centers

 
Security TechCenter
 
Security Developer Center
 
Microsoft Security Response Center
 
Microsoft Malware Protection Center
 
Microsoft Privacy
 
Microsoft Security Product Solution Centers
 

Additional Resources

 
Microsoft Cybertrust Blog
 
Microsoft Azure Security Blog
 
Microsoft Security Intelligence Report
 
Microsoft Security Development Lifecycle
 
Malware Response Guide
 
Security Troubleshooting and Support Resources
 
 
 
 
 microsoft.com/about/twcTrustworthy Computing 
 
 
 This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

© 2014 Microsoft Corporation Terms of Use | Trademarks

Microsoft respects your privacy. To learn more please read our online Privacy Statement.