Disclaimer: The opinions expressed on this blog is a personal opinion and and do not express the opinion of my employer, Microsoft, Winsec or any other party.

Note-to-Self: #MIM2016 online documentation is live

Tue 4 Aug 2015 Leave a comment

Get your #MIM2016 – download available on MSDN/VL

Tue 4 Aug 2015 Leave a comment

Source: FIM2010 FB Group As noticed by other FIM community members, the software bits of MIM 2016 are published on MSDN… mim2016_on_MSDN And an updated product website is in the air: http://www.microsoft.com/en-us/server-cloud/products/microsoft-identity-manager/ So one can expect that an announcement on the MIM2016 GA (General Availability) is on it’s way…

See also: http://www.zdnet.com/article/microsoft-identity-manager-2016-starts-rolling-out/

Note-to-self: Identity manager resources at the TechNet Evaluation Center

Mon 3 Aug 2015 Leave a comment

Source: http://aka.ms/IdentityManagerEval aka http://www.microsoft.com/en-us/evalcenter/search?k=identity%20manager&p=&a=&s=&r=&so=

Head over to the TechNet Evaluation center to find some interesting resources on Identity Manager….


Note-to-self: MVA course – Getting Started with Azure Security for the IT Professional

Thu 23 Jul 2015 Leave a comment

Source: https://www.microsoftvirtualacademy.com/en-US/training-courses/getting-started-with-azure-security-for-the-it-professional-11165

From the course description:

“Course information

Earning Trust in the Microsoft Cloud

Join Scott Edwards and Rick Claus for a look at the Microsoft commitment to earn customer and partner trust in its Cloud Services, with a focus on privacy controls, compliance, and certification.

Inside a Microsoft Datacenter

Have you ever wondered what “cloud scale” looks like? Take a virtual tour of a datacenter (designed, built, and operated by Microsoft), and learn about defense in depth, access, and cloud security.

Architecting Secure Compute Solutions on Azure

Explore ways to design solutions that will be secure and well architected for availability within your Azure subscription. Learn about security boundary implementation and ways to minimize downtime.

Virtual Appliances and Security

​ ​This session covers various elements of the network virtualization stack with emphasis on virtual networks, network security, and user defined routing.

Understanding Virtual Appliances

You will learn how to deploy virtual appliances in Azure Virtual Network. The key focus is on security appliances (firewall, gateway), ADC (application delivery controller), and WAN optimization.​ ​

Extend Your Network to the Microsoft Cloud

Learn about how Microsoft Azure ExpressRoute enables you to extend your network to Microsoft and enable Hybrid Scenarios for your Enterprise.

How to Manage Encryption Keys for Your Cloud Apps with Azure Key Vault

With the new Azure Key Vault service, customers of cloud applications can manage their keys and secrets consistently across their cloud applications. This is part 1 covering background and theory.

Demos: How to Manage Encryption Keys for Your Cloud Apps with Azure Key Vault

Managing cryptographic keys and secrets is an essential part of safeguarding data in the cloud. This is part TWO covering all the demos of the Azure Key Vault service​.

Disk Encryption with Key Vault

​Disk Encryption has been something that our customers have been asking about since Azure IaaS has been available. Learn what options are available to your Azure IaaS VMs now with Azure KeyVault.

Antivirus Options in Azure

AntiVirus extensions are available in Azure and can be included in your Virtual Machine images. Learn what options are available and how to leverage them in your solutions.

Encryption for SQL Server on Azure Virtual Machines

This talk will cover how customers can use the SQL Server Connector to use Azure Key Vault as an Extensible Key Manager in implementing SQL Server encryption on Azure Virtual Machines.

Azure SQL Database Security

This talk will cover 2 new security features for Azure SQL DB, Transparent Data Encryption and Azure Active Directory integrated authentication.”

Note-to-self: update to #FIM2010 Lifecycle support (mainstream support now : 2017-10-10)

Fri 10 Jul 2015 Leave a comment

The FIM support lifecycle page has been updated, FIM 2010 main stream support is now set to 10 oct 2017.

Source: https://support.microsoft.com/en-za/lifecycle/search?sort=PN&alpha=Microsoft%20Forefront%20Identity%20Manager&Filter=FilterNO

Products Released Lifecycle Start Date Mainstream Support End Date Extended Support End Date Service Pack Support End Date Notes
Microsoft Forefront Identity Manager 2010 2010-05-27 2017-10-10 2022-10-11 Mainstream and Extended support for Microsoft Forefront Identity Manager 2010 is extended as shown in order to provide all customers with the standard lifecycle transition timeline.
Microsoft Forefront Identity Manager 2010 R2 2012-07-24 2017-10-10 2022-10-11 2014-04-08 Mainstream and Extended support for Microsoft Forefront Identity Manager 2010 is extended as shown in order to provide all customers with the standard lifecycle transition timeline.
Microsoft Forefront Identity Manager 2010 R2 Service Pack 1 2013-01-15 Review Note Review Note Support ends 12 months after the next service pack releases or at the end of the product’s support lifecycle, whichever comes first. For more information, please see the service pack policy at http://support.microsoft.com/lifecycle/#ServicePackSupport.

Note-to-self: a new build of the #MIM2016 CTP on Microsoft Connect (Milestone CTP4, 4.3.1935.0)

Mon 6 Jul 2015 Leave a comment

Last update, in april, the FIM/MIM product group posted MIM beta-build  4.3.1790.0.
Yesterday the MIM PG has posted new build install files on Connect. (4.3.1935.0).

You’ll notice this set of data only has the install files and hasn’t got the VMs anymore…

Release date, RTM, GA getting close?

Note-to-self: Insider Threat report from Infosecbuddy

Mon 6 Jul 2015 Leave a comment

Source: http://www.infosecbuddy.com/thank-you-here-is-your-insider-threat-report/

(No, you don’t need to leave your precious dummy contact details…)

From the report:

“Highly publicized insider data theft, such as the recent Morgan Stanley breach or Edward Snowden incident,
highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats.

This report is the result of comprehensive crowd-based research in cooperation with the
260,000+ member Information Security Community on LinkedIn and Crowd Research Partners to gain more insight into the state
of insider threats and solutions to prevent them.”


Get every new post delivered to your Inbox.

Join 78 other followers