PLEASE VISIT OUR SPONSORS, WHO BRING YOU SECURITY UPDATE FOR FREE:

CrossTec

http://www.crossteccorp.com/TryASC/?utm_source=winit&utm_medium=nl&utm_content=asc&utm_campaign=asc080206

St. Bernard Software

http://www.windowsitpro.com/whitepapers/stbernard/internetaccess/index.cfm?code=SECMid0802

Core Security

http://a.gklmedia.com/pnsecurity/nl/162

CONTENTS

===========================================

IN FOCUS: More About OS Haste; BATV

NEWS AND FEATURES

- Security Vendor Claims Microsoft Is Shutting Out Competition

- Microsoft Closes Acquisition and Offers Whale of a Deal

- Sam Spade on the Spam Case - Recent Security Vulnerabilities

GIVE AND TAKE

- Security Matters Blog: Firefox 1.5.0.5 Now Available

- FAQ: Iterating a DC's Sites

- Take the Windows IT Pro Salary Survey

- "Securing Access at the Application Layer: Keeping Remote and Mobile Users Fully Functional" On-Demand Web Seminar

- Share Your Security Tips

PRODUCTS

- Authenticate Your OWA Users

- Tell Us About a Hot Product

RESOURCES AND EVENTS

FEATURED WHITE PAPER

ANNOUNCEMENTS

=== SPONSOR: CrossTec

================================

Are you spending too much time monitoring security logs?

Research shows that IT Security Managers can spend over four hours a day monitoring various security event logs and chasing after alerts. Activeworx saves you valuable time because it consolidates and manages logs from multiple vendors and devices. Activeworx Security Center is a cost-effective security information management solution that provides real-time security device log monitoring with correlated alerts, audit and compliance reports, and tools for advanced, in-depth forensic analysis. Activeworx reduces the time it takes to analyze event data from multiple sources and produces real-time reports that pinpoint network security breaches and vulnerabilities. These in-depth reports provide the details necessary for regulatory compliance reporting for Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Try Activeworx for free - fast install and free support.

http://www.crossteccorp.com/TryASC/?utm_source=winit&utm_medium=nl&utm_content=asc&utm_campaign=asc080206

=== IN FOCUS: More About OS Haste; BATV

==============

by Mark Joseph Edwards, News Editor, mark at ntsecurity / net

I received another reader perspective on OS release frequency that I'll share with you this week, then I'll briefly share some information about Bounce Address Tag Validation that I think will interest you.

The reader pointed out that many companies upgrade OSs at the same time they upgrade hardware. The reasons he cited for doing so are that sometimes it's more cost-effective to buy the OS through an OEM (typically along with the new hardware) and that many companies lack the centralized management required to upgrade OSs on old hardware in an efficient manner. A shorter OS release cycle doesn't matter that much to companies who synchronize hardware and OS upgrades.

His points make good sense, especially given that Windows Vista will require more powerful hardware than many people have available in their network environments. So some companies that want to take full advantage of Vista will no doubt upgrade to new hardware and Vista at the same time.

Last week, I learned about a new email technology called Bounce Address Tag Validation (BATV), which is designed to prevent SMTP bounce abuse. Spammers sometimes use SMTP bounce to deliver email messages to their targets. To do so, a spammer addresses a message to any fake address and sets the From address to the real intended recipient. Then the spammer sends the email message to a third-party mail server. That mail server sees that the message isn't destined for a known user at a known domain hosted by the mail server and bounces the message back to the From address, thereby unwittingly delivering the spam message for the spammer.

Malicious attackers also abuse SMTP bouncing, but they send a huge volume of email so that the victim mail server or its network bandwidth is overwhelmed.

BATV is designed to prevent these attacks. It uses a specially encoded From address that can be authenticated. Because a mail header, which includes the From field, is sent before the message body, a mail server can authenticate a message from its header before accepting or rejecting the bulk of the message. Screening out bad messages effectively reduces the load on a mail server and the overall network bandwidth.

Another great advantage of BATV is that because each mail server would perform its own From address encoding, BATV can be implemented on a per-server basis without any restrictive dependencies, such as third-party databases, peer-to-peer data sharing, or recurring service access fees.

BATV is an Internet Engineering Task Force (IETF) draft proposal that began in late 2004. You can read the proposal, which of course includes the technical specifications, at the IETF Web site at the URL below. If you're interested in the technology, check with your mail server software provider to see if it supports BATV.

http://tools.ietf.org/html/draft-levine-mass-batv-02

=== SPONSOR: St. Bernard Software

====================

Examine the threats of allowing unwanted or offensive content into your network and learn about the technologies and methodologies to defend against inappropriate content, spyware, IM, and P2P.

http://www.windowsitpro.com/whitepapers/stbernard/internetaccess/index.cfm?code=SECMid0802

=== SECURITY NEWS AND FEATURES

=======================

Security Vendor Claims Microsoft Is Shutting Out Competition

Security solution provider Agnitum claims that Microsoft's kernel patch protection will shut out competing products unless competitors resort to hacker tactics.

http://www.windowsitpro.com/Article/ArticleID/92942

Microsoft Closes Acquisition and Offers Whale of a Deal

Microsoft closed its acquisition of Whale Communications, which is now a wholly owned subsidiary. Microsoft is offering a significant discount on the newly acquired Whale security products.

http://www.windowsitpro.com/Article/ArticleID/92906

Sam Spade on the Spam Case

Whether you're investigating a possible phishing scam or determining whether the email clogging your corporate mailboxes is legitimate or spam, you can turn to the classic Sam Spade tool. Jeff Fellinge gives an overview in this article on our Web site.

http://www.windowsitpro.com/Article/ArticleID/50635

Recent Security Vulnerabilities

If you subscribe to this newsletter, you also receive Security Alerts, which inform you about recently discovered security vulnerabilities. You can also find information about these discoveries at

http://www.windowsitpro.com/departments/departmentid/752/752.html

=== SPONSOR: Core Security

===========================

Manage Vulnerabilities. Defend Against Threats. Free White Paper.

Your IT and Security budgets are tight. This Yankee Group White Paper shows real-world case studies demonstrating the ROI potential using automated penetration testing.

http://a.gklmedia.com/pnsecurity/nl/162

=== GIVE AND TAKE

====================================

SECURITY MATTERS BLOG: Firefox 1.5.0.5 Now Available

by Mark Joseph Edwards, http://www.windowsitpro.com/securitymatters

Mozilla Foundation released an update to Firefox. The new version corrects a dozen security vulnerabilities, seven of which are critical. Some of the problems include privilege escalation, JavaScript engine vulnerabilities, and possible code execution.

http://www.windowsitpro.com/Article/ArticleID/92927

FAQ: Iterating a DC's Sites

by John Savill, http://www.windowsitpro.com/windowsnt20002003faq

Q: How can I determine which sites a domain controller (DC) covers?

Find the answer at

http://www.windowsitpro.com/Article/ArticleID/92837

TAKE THE WINDOWS IT PRO SALARY SURVEY

We need your help! Windows IT Pro is launching its third Windows IT Pro Industry Salary Survey, and we want to find out all about you and what makes you a satisfied IT pro. When you complete the survey (about 10 minutes of your time), you'll be entered in a drawing for one of five $100 American Express gift certificates. Look for the survey results--and how you stack up against your peers--in our December issue. To take the survey, go to

https://websurveyor.net/wsb.dll/12237/WITPSalarySurvey06.htm

"Securing Access at the Application Layer: Keeping Remote and Mobile Users Fully Functional" on-demand Web seminar, with speakers Randy Franklin Smith and Judah Aspler. Register at

http://www.windowsitpro.com/go/seminars/whale/vpn/?partnerref=SecNLEditorial

SHARE YOUR SECURITY TIPS AND GET $100

Share your security-related tips, comments, or problems and solutions in the Windows IT Security print newsletter's Reader to Reader column. Email your contributions to r2rwinitsec@windowsitpro.com. If we print your submission, you'll get $100. We edit submissions for style, grammar, and length.

=== PRODUCTS

=========================================

by Renee Munshi, products@windowsitpro.com

Authenticate Your OWA Users

VASCO Data Security International has launched DIGIPASS easy pack, an authentication solution that works with Microsoft Outlook Web Access (OWA). With DIGIPASS easy pack, users log on to their Web mail account by entering a PIN and a one-time password generated by the provided DIGIPASS GO 3 device. DIGIPASS easy pack is designed to be affordable and easy to manage for small to midsized businesses (SMBs). It contains 10 DIGIPASS GO 3 devices and the most recent version of VASCO's VACMAN Middleware software and includes a year of maintenance support. You can also purchase additional DIGIPASS GO 3 devices. For more information, go to http://www.digipasseasypack.com

Tell Us About a Hot Product and Get a Best Buy Gift Card!

Have you used a product that changed your IT experience by saving you time or easing your daily burden? Tell us about the product, and we'll send you a Best Buy Gift Card if we write about the product in a Windows IT Pro What's Hot column. Send your product suggestion with information about how the product has helped you to whatshot@windowsitpro.com.

=== RESOURCES AND EVENTS

=============================

Cross-Platform Data Roadshow

Oracle professionals will cover key concepts about Oracle and SQL Server in enterprise database computing. This event provides invaluable information about the benefits of 64-bit computing on the Windows platform, SQL Server BI for Oracle, high-availability proof points for SQL and Oracle, and much more.

http://www.windowsitpro.com/roadshows/sqloracle/?code=0802emailannc

Are you protected company-wide against spyware, keyloggers, adware, and backdoor Trojans? Test the state-of-the-art scanning engine that uses threat signatures from multiple sources to track down the culprits that antivirus solutions alone can't protect you against. Download your free 30-day trial of CounterSpy Enterprise today!

http://www.windowsitpro.com/go/download/sunbelt/counterspy/?code=0802emailannc

How will compliance regulations affect your IT infrastructure? Help design your retention and retrieval, privacy, and security policies to make sure that your organization is compliant. Download the full ebook today!

http://www.windowsitpro.com/go/ebooks/sherpa/compliance/?code=0802emailannc

Take an up-to-date look at secure, remote access to corporate applications and stay ahead of the curve when making decisions about near- and long-term IT infrastructure. On-demand Web seminar.

http://www.windowsitpro.com/go/seminars/whale/vpn/?partnerref=0802emailannc

Learn the key requirements of an effective internal network security solution and whether your approach protects you against worms, BotNets, Trojan horses, and hackers. On-demand Web seminar.

http://www.windowsitpro.com/go/seminars/alertlogic/outsourcing/?partnerref=0802emailannc

=== FEATURED WHITE PAPER

=============================

Secure Your Online Data Transfer with SSL

Increase your customers' confidence and your business by securely collecting sensitive information online. In this free white paper, you'll learn about the various applications of SSL certificates and their appropriate deployment, along with details of how to test SSL on your Web server.

http://www.windowsitpro.com/go/whitepapers/thawte/ssl?code=0802featnl

=== ANNOUNCEMENTS

====================================

Uncover Essential Windows Knowledge Through Excavator

Try out the ultimate vertical search tool--Windows Excavator. Windows Excavator gives you fast and thorough third-party information while filtering out unwanted content. Visit http://www.winexcavator.com today!

Save $40 off Windows IT Pro Magazine

Subscribe to Windows IT Pro magazine today and SAVE up to $40! Along with your 12 issues, you'll get FREE access to the entire Windows IT Pro online article archive, which houses more than 9,000 helpful IT articles. This is a limited-time offer, so order now:

https://store.pentontech.com/index.cfm?s=1&promocode=eu2068uw

===========================================================

Security UDPATE is brought to you by the Windows IT Pro Web site's Security page (first URL below) and the Windows IT Security newsletter (subscribe at the second URL below).

http://www.windowsitpro.com/windowssecurity

https://store.pentontech.com/index.cfm?s=1&promocode=eu255xsb

Subscribe to Security UPDATE at

http://www.windowsitpro.com/Email/Index.cfm?action=archive

Unsubscribe by clicking

http://list.windowsitpro.com/u?id=%%SUBSCRIBER_ID_TAG%%

Be sure to add Security_UPDATE@list.windowsitpro.com to your antispam software's list of allowed senders.

To contact us:

About Security UPDATE content -- letters@windowsitpro.com

About technical questions -- http://www.windowsitpro.com/forums

About your product news -- products@windowsitpro.com

About your subscription -- windowsitproupdate@windowsitpro.com

About sponsoring Security UPDATE -- salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at

http://www.windowsitpro.com/AboutUs/Index.cfm?action=privacy

Windows IT Pro, a division of Penton Media, Inc.

221 East 29th Street, Loveland, CO 80538

Attention: Customer Service Department

Copyright 2006, Penton Media, Inc. All rights reserved.