[iwar] [fc:Microsoft.Attempts.to.Tighten.Screw.on.Security]

From: Fred Cohen (fc@all.net)
Date: 2001-10-03 13:18:06


Return-Path: <sentto-279987-2660-1002140289-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 03 Oct 2001 13:19:07 -0700 (PDT)
Received: (qmail 16232 invoked by uid 510); 3 Oct 2001 20:18:13 -0000
Received: from n21.groups.yahoo.com (216.115.96.71) by 204.181.12.215 with SMTP; 3 Oct 2001 20:18:13 -0000
X-eGroups-Return: sentto-279987-2660-1002140289-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n21.groups.yahoo.com with NNFMP; 03 Oct 2001 20:18:09 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 3 Oct 2001 20:18:08 -0000
Received: (qmail 57754 invoked from network); 3 Oct 2001 20:18:08 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 3 Oct 2001 20:18:08 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 3 Oct 2001 20:18:08 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id NAA18715 for iwar@onelist.com; Wed, 3 Oct 2001 13:18:07 -0700
Message-Id: <200110032018.NAA18715@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 3 Oct 2001 13:18:06 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Microsoft.Attempts.to.Tighten.Screw.on.Security]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

October 3, 2001 | InternetNews - Developer News Archives

Microsoft Attempts to Tighten Screw on Security

By Thor Olavsrud   

 Microsoft Corp.'s Outlook e-mail client and Internet Information
Services (IIS) Web server software are among the most popular
applications in the world for their functions; they also happen to be
the most prominent targets for computer viruses and worms.  Microsoft
(NASDAQ:MSFT) Wednesday set out to change that with a new initiative
dubbed the Strategic Technology Protection Program. 

"As an industry leader, Microsoft recognizes it has a special obligation
to help ensure the security of the Internet and our customers' data,"
said Brian Valentine, senior vice president of the Windows Division at
Microsoft.  "This is a problem that affects the entire industry, but we
recognize that there is more work to do.  Effective immediately, we are
stepping up our efforts with the singular focus of ensuring the security
of our customers' networks and businesses.  We will not rest until all
our customers have what they need to get secure and stay secure."

The software giant said its protection program has two phases: Get
Secure and Stay Secure. 

Microsoft has undertaken the Get Secure phase immediately.  Under Get
Secure, Microsoft is mobilizing its worldwide organization of technical
account managers and field support representatives to work with
customers to ensure their networks are operating securely.  It is also
offering free virus-related product support through a toll-free hotline,
1-866-PC-SAFETY (727-2338).  Finally, under Get Secure, the company has
made a new Security Tool Kit available online at its Microsoft Security
Web site.  The tool kit includes service packs and security hot fixes
for the Windows NT 4.0 and Windows 2000 operating systems.  A free CD
version of the tool kit will be available on Oct.  15. 

The second phase of Microsoft's new initiative, Stay Secure, will go
even further, according to the company. 

Under the Stay Secure phase, Microsoft said that within 60 days it plans
to begin providing customers with comprehensive security roll-up
packages via Windows Update.  Each package will require one step to
deploy and only one system reboot.  In addition, the company plans, by
the end of the year, to offer an automated service for providing
business customers with the comprehensive security roll-up packages
updates.  The company also said it will expand the scope of its Secure
Windows Initiative (SWI). 

SWI was announced at the RSA Conference in April, and focuses on
improving Microsoft's own development processes to deliver more secure
and reliable products and technologies.  The company said it will now
apply the tools and processes of SWI to the development of Windows 2000
SP3. 

Finally, the Microsoft promised that the next version of IIS will be
locked down by default and include an automatic, wizard-like tool to
help customers customize and secure it to meet their individual needs. 

"Worms and viruses present a continued threat to all systems and all
software," said Harris Miller, president of the Information Technology
Association of America (ITAA).  "User education, understanding best
security practices, improvements in software development, rigorous
enforcement of federal laws, and prosecution of offenders are key
elements in a coordinated and comprehensive strategy to protect our
computer systems and networks.  It is gratifying to see Microsoft step
up and offer serious outreach programs to address this national and
global challenge."

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST