• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find

Daily Archives: May 2, 2011

You are here:
  1. Home
  2. 2011
  3. May
  4. 02

Rediscover Microsoft Security Guides

Fairly often I am asked whether the Security Guides for our products still exist. The good news is: They do. The bad news is: They are called differently The previously stand-alone Microsoft product-specific security guides are now included within the Microsoft Security Compliance Manager (SCM) tool, which I blogged about several times already (e.g. New…

May 2, 20112 CommentsMicrosoft, Policy, Products, SecurityBy Roger Halbheer
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes