27 août 2012
Site Mailboxes in the new Office
Site mailboxes allow users to work together naturally – while compliance is applied behind the scenes.
A site mailbox brings Exchange emails and SharePoint documents together. For users, a site mailbox serves as a central filing cabinet, providing a place to file project emails and documents that can be only accessed and edited by site members.
When one project member files mail or documents using the site mailbox, any project member can then access the content. Site mailboxes are surfaced in Outlook 2013 and give users easy access... [Lire la suite]
25 janvier 2012
Security Compliance Manager 2.5 Beta is now available for download!
We’re pleased to announce the latest version the Microsoft Security Compliance Manager (SCM) tool—version 2.5—is now available for beta download and review!
NEW baselines include:
·Exchange Server 2007 SP3 Security Baseline
·Exchange Server 2010 SP2 Security Baseline
Updated client product baselines include:
·Windows 7 SP1 Security Compliance Baseline
·Windows Vista SP2 Security Compliance Baseline
·Windows XP SP3 Security Compliance Baseline
·Office 2010 SP1 Security Baseline
·Internet Explorer 8 Security Compliance Baseline... [Lire la suite]
10 octobre 2011
Microsoft Security Compliance Manager (SCM) 2.0
Cela faisait quelques temps que le produit était en version beta. La version finale est maintenant disponible depuis quelque jours CSM 2.0 est un Solution Accelerators comme tant d’autres que propose Microsoft. Security Compliance Manager permet de gérer des ensembles de paramètres de sécurités de manière centralisée tout en permettant de les utiliser de différentes manières (GPO, DCM, Security Template, …). Le produit propose déjà un bon nombre de templates pour nos systèmes d’exploitation et applications Microsoft les plus... [Lire la suite]
29 juin 2011
Use SCM 2 to harden your machines to meet industry standards
Download the beta release of the Microsoft Security Compliance Manager version 2Microsoft Security Compliance Manager (SCM) 2 enables organizations to take better advantage of their existing knowledge and investments, and customize security and compliance settings with ease. Customers can harden their machines to industry standards, monitor for configuration drift and address the configuration requirements of hundreds of regulations like SOX, PCI and HIPAA. Learn more.
Join the Security Compliance Manager Beta Review... [Lire la suite]
03 juin 2011
VMware Compliance Checker for vSphere
Check the compliance of your IT infrastructure against specific standards and best practices that are applicable for the environment. The Compliance Checker is a free, downloadable, fully-functional product for checking compliance of your environment to help you ensure that it remains secure and compliant.
Unlike other free tools in the market, VMware’s free Compliance Checker for vSphere is a fully-functional product that provides detailed compliance checks against the VMware vSphere Hardening Guidelines. For example, you can print... [Lire la suite]
08 avril 2010
Release version of Security Compliance Manager now available for download!
Thank you for your participation in the beta review program for Security Compliance Manager(SCM). Your feedback and input were valuable to the development of this tool. We’re pleased to announce that the release version of Security Compliance Manager is now available for download!
IMPORTANT:
Based on customer feedback and multiple improvements of the tool, we have made certain updates that now will require you to uninstall Beta bits and install the RTM bits before using Security Compliance Manager. Please uninstall Beta from... [Lire la suite]
16 novembre 2008
VMware Launches Site for Security and Compliance Auditors
For the past two years I have been listening to security and compliance auditors who routinely complain that they need help with effectively auditing for compliance (e.g., regulatory, security policy) in virtualized environments. During that span, I’d often hear auditors tell me the following:I don’t know where to start.What within the virtual infrastructure constitutes a trusted security boundary?Are the vendors in the virtualization space and the standards bodies (e.g. PCI) doing anything to help?That being said, I have taken... [Lire la suite]