SlideShare a Scribd company logo
Introduction to the Microsoft®
Security Development
Lifecycle (SDL)
Secure software made easier
Agenda
• Applications under attack
• Origins of the Microsoft SDL
• What is Microsoft doing about the threat?
• Measurable improvements at Microsoft
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Cybercrime Evolution
• LANs
• First PC virus
• Motivation: damage
1986–1995
• Internet Era
• “Big Worms”
• Motivation: damage
1995–2003
• OS, DB attacks
• Spyware, Spam
• Motivation: Financial
2004+
• Targeted attacks
• Social engineering
• Financial + Political
2006+
2007 Market prices:
Credit Card Number $0.50 - $20
Full Identity $1 - $15
Bank Account $10 - $1000
 Cost of U.S.
cybercrime:
About $70B
Source: U.S. Government Accountability Office (GAO), FBI
Attacks are focusing on applications
90% of vulnerabilities are remotely exploitable
From the Microsoft Security Intelligence Report V7
Sources: IBM X-Force, 2008
% of vulnerability disclosures:
Operating system vs browser and application vulnerabilities
Most vulnerabilities are in smaller ISV apps
11%
89%
Vendors' accountability for vulnerabilities in 2008
Top 5 ISVs
Others
Sources: IBM X-Force 2008 Security Report
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Security Timeline at Microsoft…
2002-2003
2004
2005-2007
Now
• Bill Gates writes
“Trustworthy
Computing”
memo early 2002
• “Windows
security push” for
Windows Server
2003
• Security push and
FSR extended to
other products
• Microsoft Senior
Leadership Team
agrees to require
SDL for all
products that:
• Are exposed to
meaningful risk
and/or
• Are Process
sensitive data
• SDL is enhanced
• “Fuzz” testing
• Code analysis
• Crypto design
requirements
• Privacy
• Banned APIs
• and more…
• Windows Vista is
the first OS to
go through full
SDL cycle
• Optimize the
process through
feedback,
analysis and
automation
• Evangelize
the SDL to the
software
development
community:
• SDL Process
Guidance
• SDL Optimization
Model
• SDL Pro Network
• SDL Threat
Modeling Tool
• SDL Process
Templates
Which apps are required to follow SDL?
• Any release commonly used or
deployed within an enterprise,
business, or organization
• Any release that regularly stores,
processes, or
communicates PII (as defined in
Microsoft Privacy Guidelines
for Developing Software
Products and Services) or other
sensitive customer information
• Any release that regularly
touches or listens on the
Internet or other networks
• Any release that accepts and/or
processes data from
an unauthenticated source
• Any functionality that parses any
file type that is not
protected, (i.e. not limited to
system administrators)
• Any release that contains
ActiveX and/or COM controls
• All Microsoft, MSN and Live.com
online services that are used
by external customers and
hosted in the MSN environment
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Working to protect our users…
Education Accountability
Administer and track
security training
Incident
Response
(MSRC)
Establish release criteria
and sign-off as part of
FSR
Ongoing Process Improvements
Process
Guide product teams to
meet SDL requirements
Pre-SDL Requirements: Security Training
Assess organizational knowledge on security and privacy –
establish training program as necessary
• Establish training criteria
– Content covering secure design, development, test and privacy
• Establish minimum training frequency
– Employees must attend n classes per year
• Establish minimum acceptable group training thresholds
– Organizational training targets (e.g. 80% of all technical personnel trained
prior to product RTM)
Requirements Design Implementation Verification Release Response
Phase One: Requirements
Opportunity to consider security at the outset of a project
• Development team identifies security and privacy requirements
• Development team identifies lead security and privacy contacts
• Security Advisor assigned
• Security Advisor reviews product plan, makes recommendations,
may set additional requirements
• Mandate the use of a bug tracking/job assignment system
• Define and document security and privacy bug bars
Design Implementation Verification Release Response
Phase Two: Design
• Identify design techniques (layering, managed code, least privilege, attack
surface minimization)
• Document attack surface and limit through default settings
• Define supplemental security ship criteria due to unique product issues
– Cross-site scripting tests
– Deprecation of weak crypto
• Threat Modeling
– Systematic review of features and product architecture from a security point of view
– Identify threats and mitigations
• Online services specific requirements
Define and document security architecture, identify security critical
components
Implementation Verification Release Response
Phase Three: Implementation
Full spectrum review – used to determine processes, documentation
and tools necessary to ensure secure deployment and operation
• Specification of approved build tools and options
• Static analysis (PREFix, /analyze (PREfast), FXCop)
• Banned APIs
• Use of operating system “defense in depth” protections
(NX, ASLR and HeapTermination)
• Online services specific requirements (e.g., Cross-site scripting ,
SQL Injection etc)
• Consider other recommendations (e.g., Standard Annotation
Language (SAL))
Verification Release Response
Phase Four: Verification
Started as early as possible – conducted after “code complete” stage
• Start security response planning – including response plans for
vulnerability reports
• Re-evaluate attack surface
• Fuzz testing – files, installable controls and network facing code
• Conduct “security push” (as necessary, increasingly rare)
– Not a substitute for security work done during development
– Code review
– Penetration testing and other security testing
– Review design and architecture in light of new threats
• Online services specific requirements
Release Response
Phase Five: Release – Response Plan
Creation of a clearly defined support policy – consistent
with MS corporate policies
• Provide Software Security Incident Response Plan (SSIRP)
– Identify contacts for MSRC and resources to respond to events
– 24x7x365 contact information for 3-5 engineering, 3-5 marketing, and 1-2
management (PUM and higher) individuals
• Ensure ability to service all code including “out of band” releases and
all licensed 3rd party code.
Response
Phase Five: Release – Final Security Review
Verify SDL requirements are met and there are no known
security vulnerabilities
• Provides an independent view into “security ship readiness”
• The FSR is NOT:
– A penetration test – no “penetrate and patch” allowed
– The first time security is reviewed
– A signoff process
– Key Concept: The tasks for this phase are used as a determining factor on
whether or not to ship – not used as a “catchall” phase for missed work in
earlier phases
Response
Phase Five: Release – Archive
Security response plan complete
• Customer documentation up-to-date
• Archive RTM source code, symbols, threat models to a central location
• Complete final signoffs on Checkpoint Express – validating security,
privacy and corporate compliance policies
Response
Post-SDL Requirement: Response
“Plan the work, work the plan…”
• Execution on response tasks outlined during Security Response
Planning and Release Phases
Training Requirements Design Implementation Verification Release
LOB-specific
training
Risk assessment
• Application
portfolio
• Application Risk
assessment
• Determine
service level
Asset-centric
threat modeling
• Threat model
• Design review
Internal review
• Incorporate
security checklists
and standards
• Conduct self
code review
• Security Code
analysis
Pre-production
assessment
• Comprehensive
security
assessment
• Bug
remediation
Post-production
assessment
• Host level scan
SDL Process Guidance for LOB Apps
• Line-of-Business applications are a set of critical computer applications that are vital to running an
enterprise, such as accounting, human resources (HR), payroll, supply chain management, and resource
planning applications.
• Many of the requirements and recommendations in the SDL for online services are closely related to what is
required for Line-of-Business applications.
• Line-of-Business SDL process guidance allows you to tailor a process specific to your LOB application
development while meeting SDL requirements.
The Microsoft SDL includes online services and Line-of-Business
application development guidance.
SDL Guidance for Agile Methodologies
• Requirements defined by
frequency, not phase
– Every-Sprint (most critical)
– One-Time (non-repeating)
– Bucket (all others)
• Great for projects without
end dates, like cloud services
Secure Software Development Requires
Process Improvement
• Key Concepts
– Simply “looking for bugs” doesn’t make software secure
– Must reduce the chance vulnerabilities enter into design and code
– Requires executive commitment
– Requires ongoing process improvement
– Requires education & training
– Requires tools and automation
– Requires incentives and consequences
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Microsoft SDL and Windows
Source: Windows Vista One Year Vulnerability Report, Microsoft Security Blog 23 Jan 2008
119
66
400
242
157
Windows XP Windows Vista OS I OS II OS III
Before SDL After SDL
45% reduction in Vulnerabilities
Total Vulnerabilities
Disclosed One Year
After Release
Microsoft SDL and SQL Server
Sources: Analysis by Jeff Jones (Microsoft technet security blog)
34
3
187
SQL Server 2000 SQL Server 2005 Competing commercial DB
Before SDL After SDL
91% reduction in Vulnerabilities
Total Vulnerabilities Disclosed
36 Months After Release
Summary
Attacks are moving to the application layer
SDL = embedding security into software and culture
Measurable results for Microsoft software
Microsoft is committed to making SDL widely available
and accessible
SDL Portal
http://www.microsoft.com/sdl
SDL Blog
http://blogs.msdn.com/sdl/
SDL Process on MSDN (Web)
http://msdn.microsoft.com/en-
us/library/cc307748.aspx
SDL Process on MSDN (MS Word)
http://www.microsoft.com/downloa
ds/details.aspx?FamilyID=d045a
05a-c1fc-48c3-b4d5-
b20353f97122&displaylang=en
Resources
Questions?
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or
other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft
must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information
provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

PPT
Software Engineering (Introduction to Software Engineering)
PDF
Software development process
PDF
Software Engineering Lab Manual
PPT
Introduction to Software Engineering
PDF
2- THE CHANGING NATURE OF SOFTWARE.pdf
PPTX
Lecture 01 Introduction to Software Engineering
PPT
Chapter 3 requirements
PDF
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Software Engineering (Introduction to Software Engineering)
Software development process
Software Engineering Lab Manual
Introduction to Software Engineering
2- THE CHANGING NATURE OF SOFTWARE.pdf
Lecture 01 Introduction to Software Engineering
Chapter 3 requirements
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2

What's hot (20)

PPTX
What is software engineering
PPTX
Software Development Methodologies
PPT
Android Architecture
PPTX
Mobile Application Development-Android and It’s Tools
PPTX
Software Process Models
PPTX
Control Flow Testing
PPTX
Software Testing 4/5
PDF
Software Engineering : Requirement Analysis & Specification
PPTX
Introduction to Android ppt
PDF
Android life cycle
PPT
Software Engineering ppt
PPTX
Need for Software Engineering
PPTX
Software testing life cycle
PPTX
Unit 3 - URLs and URIs
PPT
Software Engineering (Process Models)
PPTX
Lect4 software economics
PPT
Artificial Intelligence: The Nine Phases of the Expert System Development Lif...
PPTX
Introduction to Software Quality & its' Challenges
PPTX
Software Engineering concept
PPTX
Designing applications with web access capabilities
What is software engineering
Software Development Methodologies
Android Architecture
Mobile Application Development-Android and It’s Tools
Software Process Models
Control Flow Testing
Software Testing 4/5
Software Engineering : Requirement Analysis & Specification
Introduction to Android ppt
Android life cycle
Software Engineering ppt
Need for Software Engineering
Software testing life cycle
Unit 3 - URLs and URIs
Software Engineering (Process Models)
Lect4 software economics
Artificial Intelligence: The Nine Phases of the Expert System Development Lif...
Introduction to Software Quality & its' Challenges
Software Engineering concept
Designing applications with web access capabilities
Ad

Similar to Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx (20)

PPTX
Microsoft Security Development Lifecycle
PPTX
Agile and Secure SDLC
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PPTX
Security Best Practices
PPTX
SDL: Secure design principles
DOCX
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
PPTX
Security in the Development Lifecycle - lessons learned
PDF
SDLC & DevSecOps
PPTX
Security best practices
PDF
Beyond security testing
PPTX
Week 4.1 Building security into the software development lifecycle copy.pptx
DOCX
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
PPT
Software Security Engineering
PDF
A journey into Application Security
PPT
Software Security in the Real World
PDF
Agile Secure Development
PPTX
How can you deliver a secure product
PDF
ACS-security-2821-001 Lecture Note 13.pdf
PPT
Software security engineering
Microsoft Security Development Lifecycle
Agile and Secure SDLC
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Best Practices
SDL: Secure design principles
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Security in the Development Lifecycle - lessons learned
SDLC & DevSecOps
Security best practices
Beyond security testing
Week 4.1 Building security into the software development lifecycle copy.pptx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
Software Security Engineering
A journey into Application Security
Software Security in the Real World
Agile Secure Development
How can you deliver a secure product
ACS-security-2821-001 Lecture Note 13.pdf
Software security engineering
Ad

Recently uploaded (20)

PPTX
Transform Your Business with a Software ERP System
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ai tools demonstartion for schools and inter college
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Digital Strategies for Manufacturing Companies
PPTX
Introduction to Artificial Intelligence
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
history of c programming in notes for students .pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
AI in Product Development-omnex systems
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
PTS Company Brochure 2025 (1).pdf.......
Transform Your Business with a Software ERP System
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ai tools demonstartion for schools and inter college
Understanding Forklifts - TECH EHS Solution
Design an Analysis of Algorithms I-SECS-1021-03
Design an Analysis of Algorithms II-SECS-1021-03
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Digital Strategies for Manufacturing Companies
Introduction to Artificial Intelligence
Reimagine Home Health with the Power of Agentic AI​
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
history of c programming in notes for students .pptx
Operating system designcfffgfgggggggvggggggggg
AI in Product Development-omnex systems
How to Migrate SBCGlobal Email to Yahoo Easily
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PTS Company Brochure 2025 (1).pdf.......

Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx

  • 1. Introduction to the Microsoft® Security Development Lifecycle (SDL) Secure software made easier
  • 2. Agenda • Applications under attack • Origins of the Microsoft SDL • What is Microsoft doing about the threat? • Measurable improvements at Microsoft
  • 4. Cybercrime Evolution • LANs • First PC virus • Motivation: damage 1986–1995 • Internet Era • “Big Worms” • Motivation: damage 1995–2003 • OS, DB attacks • Spyware, Spam • Motivation: Financial 2004+ • Targeted attacks • Social engineering • Financial + Political 2006+ 2007 Market prices: Credit Card Number $0.50 - $20 Full Identity $1 - $15 Bank Account $10 - $1000  Cost of U.S. cybercrime: About $70B Source: U.S. Government Accountability Office (GAO), FBI
  • 5. Attacks are focusing on applications 90% of vulnerabilities are remotely exploitable From the Microsoft Security Intelligence Report V7 Sources: IBM X-Force, 2008 % of vulnerability disclosures: Operating system vs browser and application vulnerabilities
  • 6. Most vulnerabilities are in smaller ISV apps 11% 89% Vendors' accountability for vulnerabilities in 2008 Top 5 ISVs Others Sources: IBM X-Force 2008 Security Report
  • 8. Security Timeline at Microsoft… 2002-2003 2004 2005-2007 Now • Bill Gates writes “Trustworthy Computing” memo early 2002 • “Windows security push” for Windows Server 2003 • Security push and FSR extended to other products • Microsoft Senior Leadership Team agrees to require SDL for all products that: • Are exposed to meaningful risk and/or • Are Process sensitive data • SDL is enhanced • “Fuzz” testing • Code analysis • Crypto design requirements • Privacy • Banned APIs • and more… • Windows Vista is the first OS to go through full SDL cycle • Optimize the process through feedback, analysis and automation • Evangelize the SDL to the software development community: • SDL Process Guidance • SDL Optimization Model • SDL Pro Network • SDL Threat Modeling Tool • SDL Process Templates
  • 9. Which apps are required to follow SDL? • Any release commonly used or deployed within an enterprise, business, or organization • Any release that regularly stores, processes, or communicates PII (as defined in Microsoft Privacy Guidelines for Developing Software Products and Services) or other sensitive customer information • Any release that regularly touches or listens on the Internet or other networks • Any release that accepts and/or processes data from an unauthenticated source • Any functionality that parses any file type that is not protected, (i.e. not limited to system administrators) • Any release that contains ActiveX and/or COM controls • All Microsoft, MSN and Live.com online services that are used by external customers and hosted in the MSN environment
  • 11. Working to protect our users… Education Accountability Administer and track security training Incident Response (MSRC) Establish release criteria and sign-off as part of FSR Ongoing Process Improvements Process Guide product teams to meet SDL requirements
  • 12. Pre-SDL Requirements: Security Training Assess organizational knowledge on security and privacy – establish training program as necessary • Establish training criteria – Content covering secure design, development, test and privacy • Establish minimum training frequency – Employees must attend n classes per year • Establish minimum acceptable group training thresholds – Organizational training targets (e.g. 80% of all technical personnel trained prior to product RTM) Requirements Design Implementation Verification Release Response
  • 13. Phase One: Requirements Opportunity to consider security at the outset of a project • Development team identifies security and privacy requirements • Development team identifies lead security and privacy contacts • Security Advisor assigned • Security Advisor reviews product plan, makes recommendations, may set additional requirements • Mandate the use of a bug tracking/job assignment system • Define and document security and privacy bug bars Design Implementation Verification Release Response
  • 14. Phase Two: Design • Identify design techniques (layering, managed code, least privilege, attack surface minimization) • Document attack surface and limit through default settings • Define supplemental security ship criteria due to unique product issues – Cross-site scripting tests – Deprecation of weak crypto • Threat Modeling – Systematic review of features and product architecture from a security point of view – Identify threats and mitigations • Online services specific requirements Define and document security architecture, identify security critical components Implementation Verification Release Response
  • 15. Phase Three: Implementation Full spectrum review – used to determine processes, documentation and tools necessary to ensure secure deployment and operation • Specification of approved build tools and options • Static analysis (PREFix, /analyze (PREfast), FXCop) • Banned APIs • Use of operating system “defense in depth” protections (NX, ASLR and HeapTermination) • Online services specific requirements (e.g., Cross-site scripting , SQL Injection etc) • Consider other recommendations (e.g., Standard Annotation Language (SAL)) Verification Release Response
  • 16. Phase Four: Verification Started as early as possible – conducted after “code complete” stage • Start security response planning – including response plans for vulnerability reports • Re-evaluate attack surface • Fuzz testing – files, installable controls and network facing code • Conduct “security push” (as necessary, increasingly rare) – Not a substitute for security work done during development – Code review – Penetration testing and other security testing – Review design and architecture in light of new threats • Online services specific requirements Release Response
  • 17. Phase Five: Release – Response Plan Creation of a clearly defined support policy – consistent with MS corporate policies • Provide Software Security Incident Response Plan (SSIRP) – Identify contacts for MSRC and resources to respond to events – 24x7x365 contact information for 3-5 engineering, 3-5 marketing, and 1-2 management (PUM and higher) individuals • Ensure ability to service all code including “out of band” releases and all licensed 3rd party code. Response
  • 18. Phase Five: Release – Final Security Review Verify SDL requirements are met and there are no known security vulnerabilities • Provides an independent view into “security ship readiness” • The FSR is NOT: – A penetration test – no “penetrate and patch” allowed – The first time security is reviewed – A signoff process – Key Concept: The tasks for this phase are used as a determining factor on whether or not to ship – not used as a “catchall” phase for missed work in earlier phases Response
  • 19. Phase Five: Release – Archive Security response plan complete • Customer documentation up-to-date • Archive RTM source code, symbols, threat models to a central location • Complete final signoffs on Checkpoint Express – validating security, privacy and corporate compliance policies Response
  • 20. Post-SDL Requirement: Response “Plan the work, work the plan…” • Execution on response tasks outlined during Security Response Planning and Release Phases
  • 21. Training Requirements Design Implementation Verification Release LOB-specific training Risk assessment • Application portfolio • Application Risk assessment • Determine service level Asset-centric threat modeling • Threat model • Design review Internal review • Incorporate security checklists and standards • Conduct self code review • Security Code analysis Pre-production assessment • Comprehensive security assessment • Bug remediation Post-production assessment • Host level scan SDL Process Guidance for LOB Apps • Line-of-Business applications are a set of critical computer applications that are vital to running an enterprise, such as accounting, human resources (HR), payroll, supply chain management, and resource planning applications. • Many of the requirements and recommendations in the SDL for online services are closely related to what is required for Line-of-Business applications. • Line-of-Business SDL process guidance allows you to tailor a process specific to your LOB application development while meeting SDL requirements. The Microsoft SDL includes online services and Line-of-Business application development guidance.
  • 22. SDL Guidance for Agile Methodologies • Requirements defined by frequency, not phase – Every-Sprint (most critical) – One-Time (non-repeating) – Bucket (all others) • Great for projects without end dates, like cloud services
  • 23. Secure Software Development Requires Process Improvement • Key Concepts – Simply “looking for bugs” doesn’t make software secure – Must reduce the chance vulnerabilities enter into design and code – Requires executive commitment – Requires ongoing process improvement – Requires education & training – Requires tools and automation – Requires incentives and consequences
  • 25. Microsoft SDL and Windows Source: Windows Vista One Year Vulnerability Report, Microsoft Security Blog 23 Jan 2008 119 66 400 242 157 Windows XP Windows Vista OS I OS II OS III Before SDL After SDL 45% reduction in Vulnerabilities Total Vulnerabilities Disclosed One Year After Release
  • 26. Microsoft SDL and SQL Server Sources: Analysis by Jeff Jones (Microsoft technet security blog) 34 3 187 SQL Server 2000 SQL Server 2005 Competing commercial DB Before SDL After SDL 91% reduction in Vulnerabilities Total Vulnerabilities Disclosed 36 Months After Release
  • 27. Summary Attacks are moving to the application layer SDL = embedding security into software and culture Measurable results for Microsoft software Microsoft is committed to making SDL widely available and accessible
  • 28. SDL Portal http://www.microsoft.com/sdl SDL Blog http://blogs.msdn.com/sdl/ SDL Process on MSDN (Web) http://msdn.microsoft.com/en- us/library/cc307748.aspx SDL Process on MSDN (MS Word) http://www.microsoft.com/downloa ds/details.aspx?FamilyID=d045a 05a-c1fc-48c3-b4d5- b20353f97122&displaylang=en Resources
  • 30. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes