Trustworthy Computing

Microsoft Security Newsletter

Stay up to date with security insights, resources, best practices, and events for IT professionals and developers. Browse past newsletters or subscribe to get the latest news delivered to your inbox.

Subscribe

 

 
 
Welcome to June 2015's Security Newsletter!

The latest volume of the Microsoft Security Intelligence Report is now available. This volume of the report focuses on the threat landscape in the second half of 2014 when there were some dramatic changes.

The vulnerability disclosure data published in the report suggests that there was a 56.3% increase in vulnerability disclosures between the third and fourth quarters of 2014. After many periods of relatively small changes in disclosure totals, the 4,512 vulnerabilities disclosed during the second half of 2014 is the largest number of vulnerabilities disclosed in any half-year period since the CVE system was launched in 1999. Disclosures of vulnerabilities in applications other than web browsers and operating system applications increased 98.3% in the second half of 2014 and accounted for 76.5% of total disclosures for the period.

https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/52891_Jun2015_01.png
Figure 1. Industrywide vulnerability disclosures between the first half of 2012 (1H12) and the second half of 2014 (2H14)

https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/52891_Jun2015_02.png
Figure 2. Industrywide operating system, browser, and application vulnerabilities between the first half of 2012 (1H12) and the second half of 2014 (2H14)

Overall, encounters with Java exploits continued to decrease significantly in the second half of 2014, while Flash Player exploit attempts increased.

https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/52891_Jun2015_03.png
Figure 3. Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in 2014

https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/52891_Jun2015_04.png
Figure 4. Adobe Flash Player exploits detected and blocked by Microsoft real-time antimalware products in 2014

Regional threat assessments are available for over 100 countries as well as an online tool that enables you to quickly compare two locations.

https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/52891_Jun2015_05.png
Figure 5. Infection and Encounter Rate Trends tool available at www.microsoft.com/security/sir/threat

There is plenty of other threat intelligence and guidance in the new report that can help you protect your infrastructure from modern attacks. Please download the latest report at https://microsoft.com/sir.

In the meantime, thanks to all the sessions at Microsoft Ignite last month, and the announcement about the free upgrade offer for consumers, the excitement around Windows 10 is building. As a result, this month’s newsletter features resources to help you find out what’s coming in Windows 10 with regard to security.

Tim Rains   Best regards,
Tim Rains, Chief Security Advisor
Cybersecurity & Cloud Strategy, Microsoft


Want to share this newsletter with a friend or colleague? Click here for the online edition and subscription options.
Have feedback on how we can improve this newsletter? Email us at secnlfb@microsoft.comand share your ideas.

 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
Top Stories
 
Advances in scripting security and protection in Windows 10 and PowerShell V5
Learn how the Windows PowerShell team has significantly advanced security focused logging and detection in Windows 10 and PowerShell v5.

New access and security controls for Outlook for iOS and Android
Outlook now uses Active Directory Authentication Library (ADAL)-based authentication for Exchange Online mailboxes in Office 365, replacing the previously used basic authentication method. This new authentication method enables IT administrators to configure new access scenarios for sign in to Office 365 and to better control and manage Outlook on mobile devices in their organization. Learn more.

The life and times of an exploit
One of the items examined in the latest version of the Microsoft Security Intelligence Report is the increased speed at which purveyors of commercial exploit kits are trying to take advantage of newly disclosed vulnerabilities, even in cases where security updates have been developed, released and deployed to hundreds of millions of systems around the world. Learn more about this trend and the most effective way to mitigate risk.

Azure Disk Encryption management for Windows and Linux virtual machines
Microsoft Azure enables you to control your Azure hosted data through a range of advanced technologies to encrypt, control and manage encryption keys, control & audit access of data. Explore a new Azure Disk Encryption solution that can help protect and safeguard your data to meet your organizational security and compliance commitments.

 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
Security Guidance
What's new in Windows 10: Device Guard
Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. Find out how it works, when to use it, and learn about the software and hardware required.

What's new in Windows 10: Enterprise Data Protection
Get an early look at Enterprise Data Protection (EDP), a new feature that will offer a better user experience, while helping to better separate and protect enterprise apps and data against disclosure risks across both company and personal devices, without requiring changes in environments or apps.

What's new in Windows 10: Microsoft Passport
In Windows 10, Microsoft Passport will replace passwords with strong two-factor authentication that consists of an enrolled device and a Windows Hello (biometric) or PIN. Learn how Microsoft Passport works and start to explore enterprise scenarios for using this technology.

A new era of threat resistance for the Windows 10 platform
Walk through the new capabilities in Windows, such as Device Guard, that will deliver decisive improvements when it comes to malware and other online threats.

The end game for passwords and credential theft?
Find out how Windows 10 can help protected against credential theft crisis with a solution that is easy to deploy, always multi-factor, theft and phish proof, and provides true single sign-on even as you transition from on-premises to the web.

Windows 10: disrupting the revolution of cyber-threats with revolutionary security
Explore the technologies that can truly end the use of passwords and make multi-factor authentication the default, provide an easy to use and deploy data loss prevention (DLP) capability right in the platform, and enable organizations to virtually eliminate malware threats to the Windows platform including those that come by way of the browser.

Secure authentication with Windows Hello
Windows 10 will remove biometric frameworks dependencies on passwords, address bio sensor costs challenges, and have biometrics poised for mainstreaming. Learn more about Microsoft’s work on biometrics options such as fingerprints and other options, sensor types, and what you can expect in terms of bio-enabled devices in 2015.

Protecting your data with containers without boxing yourself in
Windows 10 delivers a fully integrated data loss prevention (DLP) capability, making it easy to deploy, cost effective, and easy to use. Learn more about this new technology along with the improvements coming soon for BitLocker.

 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
Community Update
Black belt security with Windows 10
Learn why and how you should leverage Windows 10 security technologies like Device Guard, BitLocker, AppLocker, UAC, Least Privilege, and Remote Desktop Restricted Admin-mode. In this 75-minute session with Microsoft Windows MVP and Windows Technical Expert Program member Sami Laiho, you’ll see hands-on examples on how someone might attempt to break into an unprotected operating system—and learn how to protect your organization. If you still need to convince your boss to give you budget for implementing more security measures, don't miss this!

 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
This Month's Security Bulletins
 

June 2015 Security Bulletins

Critical

 
MS15-056: 3058515 Cumulative Security Update for Internet Explorer
 
MS15-057: 3033890 Vulnerability in Windows Media Player Could Allow Remote Code Execution


Important

 
MS15-059: 3064949 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
 
MS15-060: 3059317 Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution
 
MS15-061: 3057839 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
 
MS15-062: 3062577 Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege
 
MS15-063: 3063858 Vulnerability in Windows Kernel Could Allow Elevation of Privilege
 
MS15-064: 3062157 Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege
 

June 2015 Security Bulletin Resources:

 
June 2015 Bulletin Release Blog Post
Malicious Software Removal Tool: June 2015 Update


 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
Security Events and Training
 
Microsoft Intune Core Skills Jump Start
Look at the latest mobility features in Microsoft Intune, a born-in-the-cloud device management solution. Find out how you can integrate with the existing market leader in endpoint management, Microsoft System Center Configuration Manager and manage mobile devices with Office 365.

Endpoint Protection in Configuration Manager 2012
Endpoint Protection in System Center 2012 Configuration Manager provides security, antimalware, and Windows Firewall management for computers in your enterprise. Walk through the planning, configuration, and administration of Endpoint Protection plus learn about prerequisites, best practices, and deployment.

 
https://image.email.microsoftemail.com/lib/fe68157075670478701d/m/1/51148_Security_Newsletter_2013_borderLine.jpg
 

Essential Tools

 
Microsoft Security Bulletins
 
Microsoft Security Advisories
 
Microsoft Security Development Lifecycle Starter Kit
 
Enhanced Mitigation Experience Toolkit
 
Malicious Software Removal Tool
 
Microsoft Baseline Security Analyzer
 

Security Centers

 
Security TechCenter
 
Security Developer Center
 
Microsoft Security Response Center
 
Microsoft Malware Protection Center
 
Microsoft Privacy
 
Microsoft Security Product Solution Centers
 

Additional Resources

 
Microsoft Cybertrust Blog
 
Microsoft Security Intelligence Report
 
Microsoft Security Development Lifecycle
 
Malware Response Guide
 
Security Troubleshooting and Support Resources
 
 
 
 
  microsoft.com/about/twc Trustworthy Computing  
 
 
  This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

© 2015 Microsoft Corporation Terms of Use | Trademarks

Microsoft respects your privacy. To learn more please read our online Privacy Statement.
 
 
 
 

2015