SlideShare a Scribd company logo
Forefront Security for Office
Communications Server
Product Overview


                                  Name
                                    Title
                   Microsoft Corporation
Agenda
• Corporate IM Security Overview
• Forefront Solutions Overview
• Introduction to Forefront Security for
  Office Communications Server
  − Features and Benefits
  − Core protection and administration
    capabilities
• Summary
Corporate IM Environment
                              Security Vulnerabilities are Significant
                               IM-based malware and spam continue to grow
             IM
                               Few organizations have implemented an enterprise IM platform and policies
                               Even fewer organizations have implemented IM hygiene solutions



                              Compliance is a Primary Concern
                               IM can be used to subvert corporate information sharing policies
                               Employees can send and receive confidential or risky documents
                               IM, like e-mail, is subject to electronic discovery in regulated industries




                              Lack of Corporate-wide IM Strategy
                               Corporations choose to “block” or not support IM due to avoid risk or perceived “timing
                                wasting”, even though employees can easily work around any restrictions
                               Reliance on consumer IM applications opens organization to risk.


Gartner Group, “Ignoring Instant Messaging at Work Won't Make It Go Away, April 2008
Why Secure Enterprise IM?
                                                 IM has penetrated over 90% of organizations with consumer-
                                                  based tools predominant.
     Wide Spread,
    Unmanaged Use                                In organizations where IM is “not allowed” or
                                                  “unsupported”, employees consistently use tools like
                                                  meebo.com to overcome restrictions

                                                 Public network IM is unencrypted and easy to intercept
                                                 Malicious-code attacks via consumer IM services have been
   Network Security                               increasing for several years
      Concerns                                   Consumer IM introduces different protocols that can find ways
                                                  around enterprise authentication systems

                                                 It is difficult to track what has been sent or received via IM.
       Potential                                 Companies need to extend enforcement of information-sharing
                                                  policies to IM, particularly in regulated industries.
     Corporate Risk
                                                 IM can be a potential source of lost of research, analytical
                                                  data, and other intellectual capital
Garrtner Group, “Ignoring Instant Messaging at Work Won't Make It Go Away, April 2008
Garrtner Group, “Consumer IM Applications Could Put Your Company at Risk”, Sept. 2007
What is Microsoft Forefront?
Microsoft Forefront is a comprehensive line of business security products providing
greater protection and control through integration with your existing IT infrastructure,
simplified deployment, management, and analysis.



Client and Server OS             Server Applications                   Edge
Microsoft Forefront Security for Office Communications Server provides
fast and effective protection against IM-based malware by including
multiple scanning engines from industry-leading security partners in a
single solution and helps reduce corporate liability by blocking IM
messaging containing inappropriate content.
                          Integrates multiple antimalware engines
   Comprehensive
     Protection           Blocks transfer of dangerous file types
                          Prevents sharing of out-of-policy content

                          Optimizes virus scanning on OCS 2007
      Integrated
       Security           Integrates with multiple server roles
                          Protects federated connections and public IM

      Simplified          Built-in administrator console
     Management           Automated signature updates
                          IM notifications for out-of-policy activity
Protects Internal and External IM


                                    Access Edge Server   Director Server Front-End Server
 Federated (Trusted) Organization



             Internet



      Public IM Networks




        Remote Users                                              Internal Users




                   Protects OCS 2007 and OCS 2007 R2
Harnessing Multiple Scanning
Technologies in a Single Solution
•   Forefront Security for Office Communications Server
    harnesses the strengths of multiple antivirus scan engines
    from Microsoft and industry-leading security partners
    − All engines are delivered and licensed by Forefront
•   Forefront Security for Office Communications Server can
    all or a subset of its five engines per scanning operation

                                  A


                                  B


                                  C

         Office Communications
                                  D
               Server 2007

                                  E
The Multiple Engine Advantage
                                                                       Response time1 (in hours)
                                                                                    Single-engine solutions
                              WildList          Malware
Rapid response to             Number             Name
                                                                  FSOCS Engines      Vendor A*    Vendor B*    Vendor C*

new threats                    10/08     agent_itw69.ex_                      0.00         0.00       226.88         0.00
                               10/08     autorun_itw463.ex_                   0.00       115.62       109.38       126.08
Fail-safe protection           10/08     autorun_itw476.ex_                   0.00       152.98      1039.35       570.82
through redundancy             10/08     ircbot_itw466.ex_                    0.00         0.00         0.00       696.88
                               10/08     onlinegames_itw593.ex_              66.48        47.70       115.55       152.42
Diversity of                   10/08     rbot_itw2666.ex_                     0.00         0.00         0.00       934.85
                               10/08     slenfbot_itw21.ex_                   0.00         0.00         0.00       172.75
antivirus engines              10/08     vb_itw163.ex_                        0.00        45.17         0.00         0.00
and heuristics                 10/08     zbot_itw18.ex_                       0.00      1195.55       473.87       463.32
                               11/08     agent_itw75.ex_                      0.00        71.70        45.43       705.37
                               11/08     auraax_itw1.ex_                      0.00        74.73        50.03        61.87
                               11/08     autorun_itw490.ex_                   0.00         0.00        75.23       394.33
                               11/08     bagle_itw199.ex_                    10.52        60.67       561.95       257.63
                               11/08     ircbot_itw470.ex_                    0.00       150.88       336.37      1034.00
                               11/08     krap_itw1.ex_                        0.00        45.80         0.00       154.07
                               11/08     magania_itw13.ex_                    0.00        45.80        67.55       103.87
                               11/08     rbot_itw2668.ex_                     0.00         0.00         0.00      1156.45
                               11/08     sdbot_itw2685.ex_                    0.00        43.48       709.07      1022.70
    = Less than 5 hours        11/08     slenfbot_itw26.ex_                   0.00        75.37         0.00       182.88
    = 5 to 24 hours            11/08     slenping_itw3.ex_                    0.00        51.60         0.00      1058.47
                               12/08     agent_itw82.ex_                      0.00        49.58        71.62        35.32
    = More than 24 hours       12/08     autorun_itw511.ex_                   0.00        78.43        74.92        64.17
                               12/08     ircbot_itw474.ex_                    0.00       176.23         0.00       139.32
                               12/08     koobface_itw9.ex_                    0.00        41.22         0.00      1182.03
                               12/08     sdbot_itw2686.ex_                    0.00        63.07       709.15      1227.40
                               12/08     zbot_itw27.ex_                       0.00      1274.87      1059.32      1215.45


                           ** 0.00 denotes proactive detection        1   Source: AV-Test.org 2008 (www.av-test.org)
Help Reduce Corporate Liability
•   Block dangerous or unwanted files
    − By type and extension– blocks files (.exe) that could
      carry malicious code or (.mp3) that violate corporate
      policy
    − By file name – block dangerous named files before a
      signature is available.
•   Prevent sharing of inappropriate content:
    − Includes installable word lists in 11 languages to
      automatically block messages and file transfers
      containing profanity and discriminatory content.
    − Allows administrators to define keywords to prevent
      sharing of corporate confidential or unauthorized
      information.
Forefront Administrator
•   Provides local and remote management and
    configuration of:
    −   Scan Jobs
    −   Content Filters
    −   Updates
    −   Incidents
    −   Statistics
    −   Quarantine
•   Automates
    updates for all
    included scan
    engines
    − No administrator action required
Notify Users of IM Policies
•   Automatically notify users
    when they attempt to
    share malware, unwanted
    file types, or out-of-policy
    keywords.
•   Can be configured
    separately for internal and
    external users
    − IM admin receives e-mail
      notification
    − Sender (and recipient if
      desired) receive IM
      communication
                                   User IM Notification
Summary
•   Organizations need to manage and secure
    enterprise IM
•   Forefront Security for Office
    Communications Server
    − Provides fast and effective protection against
      IM-based malware
    − Helps reduce corporate liability by preventing
      inappropriate content from being shared in IM
    − Simplifies management with easy-to-use
      administrator console, automated updates and
      notifications on out-of-policy conduct.
Next Steps
•   Read more about Forefront Security for
    Office Communications Server
    − http://www.microsoft.com/forefront/serversecurity/ocs/d
      efault.mspx
•   Download the trial software
    − http://technet.microsoft.com/evalcenter/cc509001.aspx
•   View the webcast
    − http://msevents.microsoft.com/CUI/EventDetail.aspx?E
      ventID=1032377127&Culture=en-US
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market
     conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
                                 MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

PPT
Microsoft Forefront - Security for Office Communications Server Technical Ov...
PDF
Personal identity information protection
PDF
分会场八云及虚拟环境安全防护
PDF
VSD Infotech
PDF
Common 2009 Getting Started On The Road To Compliance
PDF
Microsoft Forefront - Security for Communications Server Datasheet
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PDF
Microsoft Forefront - Protection Suite
Microsoft Forefront - Security for Office Communications Server Technical Ov...
Personal identity information protection
分会场八云及虚拟环境安全防护
VSD Infotech
Common 2009 Getting Started On The Road To Compliance
Microsoft Forefront - Security for Communications Server Datasheet
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Microsoft Forefront - Protection Suite

What's hot (20)

PPTX
Symantec Web Security Solutions
PDF
Cat6500 Praesentation
PPT
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
PDF
Microsoft Forefront - Protection 2010 for SharePoint
PDF
Securing Public Web Servers
PDF
ASFWS 2011 - Secure software development for mobile devices
PDF
Implementing ISO 27001 In A Cost Effective Way
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PDF
Trend micro deep security
PPTX
PDF
It's 2012 and My Network Got Hacked - Omar Santos
PDF
Securing the Human (人を守るセキュリティ)
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PDF
Regulatory Compliance Financial Institution
PDF
20090106c Presentation Custom
PDF
Session 1: Windows 8 with Gerry Tessier
PDF
Presentatie mc afee emm 2011
PDF
Bizhub v care security white paper version 2
PDF
C90 Security Service
PPTX
Trend micro v2
Symantec Web Security Solutions
Cat6500 Praesentation
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Protection 2010 for SharePoint
Securing Public Web Servers
ASFWS 2011 - Secure software development for mobile devices
Implementing ISO 27001 In A Cost Effective Way
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Trend micro deep security
It's 2012 and My Network Got Hacked - Omar Santos
Securing the Human (人を守るセキュリティ)
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Regulatory Compliance Financial Institution
20090106c Presentation Custom
Session 1: Windows 8 with Gerry Tessier
Presentatie mc afee emm 2011
Bizhub v care security white paper version 2
C90 Security Service
Trend micro v2
Ad

Viewers also liked (9)

POT
MOP Product Presentation
PPTX
20100115 Critical Links Edge Box Product Presentation
PPT
Presentation Nokia
PPT
uCommerce 1.0 product presentation
PPTX
3d printing & prototyping
KEY
Printer Presentation - H.Toor
PPTX
Toshiba Product Presentation
PPTX
Computer Virus powerpoint presentation
PPTX
3D printer Technology _ A complete presentation
MOP Product Presentation
20100115 Critical Links Edge Box Product Presentation
Presentation Nokia
uCommerce 1.0 product presentation
3d printing & prototyping
Printer Presentation - H.Toor
Toshiba Product Presentation
Computer Virus powerpoint presentation
3D printer Technology _ A complete presentation
Ad

Similar to Microsoft Forefront - Security for Office Communications Server Product Overview Presentation (20)

PDF
Insecure mag-19
PPTX
50357 a enu-module01
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PDF
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
PDF
Microsoft Forefront - Secure Messaging Solution Datasheet
PPT
Panda Cloud Protection - protectie maxima, costuri reduse
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
IE Exploit Protection
PDF
Revolutionary Security. Ultimate Performance. Minimal Management.
PDF
Computacenter success story
PDF
Antigen tdm
PDF
SIEM evolution
PDF
Mcafee ips nsp-2011
PDF
NEC IWS+PAN - Cyber Security Solutions
PDF
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
PDF
Antivirus específicos para entornos virtualizados
PPT
Information Security
PPTX
Connectivity for a Smarter Planet
PPTX
Mct summit na what's new in forefront endpoint protection 2012 beta
PPTX
Mct summit na what's new in forefront endpoint protection 2012 beta
Insecure mag-19
50357 a enu-module01
“8th National Biennial Conference on Medical Informatics 2012”
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
Microsoft Forefront - Secure Messaging Solution Datasheet
Panda Cloud Protection - protectie maxima, costuri reduse
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
IE Exploit Protection
Revolutionary Security. Ultimate Performance. Minimal Management.
Computacenter success story
Antigen tdm
SIEM evolution
Mcafee ips nsp-2011
NEC IWS+PAN - Cyber Security Solutions
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Antivirus específicos para entornos virtualizados
Information Security
Connectivity for a Smarter Planet
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta

More from Microsoft Private Cloud (20)

DOCX
Hyper-V improves appliance manufacturer’s productivity
DOCX
AcXess saves U.S.$5 million in hardware with Hyper V
DOCX
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
PDF
Cloud Computing Myth Busters - Know the Cloud
PDF
Economics of the Cloud - A Report Based On CFO Survey
PDF
Assess The Economics Of The Cloud By Using In Depth Modeling
PDF
A Guide To Finding Your Cloud Power
DOCX
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
DOC
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
DOCX
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
DOC
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
DOCX
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
DOC
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
DOCX
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
DOC
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
PDF
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
DOCX
Communicate Easily with Others in Different Locations with Microsoft Office C...
PPTX
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
PPTX
Cloud Based Communications Solutions from Microsoft
PPTX
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Hyper-V improves appliance manufacturer’s productivity
AcXess saves U.S.$5 million in hardware with Hyper V
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Cloud Computing Myth Busters - Know the Cloud
Economics of the Cloud - A Report Based On CFO Survey
Assess The Economics Of The Cloud By Using In Depth Modeling
A Guide To Finding Your Cloud Power
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Communicate Easily with Others in Different Locations with Microsoft Office C...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Cloud Based Communications Solutions from Microsoft
Reduce Capital & Operational Expenses with Business Productivity Online Suite

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Monthly Chronicles - July 2025
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence

Microsoft Forefront - Security for Office Communications Server Product Overview Presentation

  • 1. Forefront Security for Office Communications Server Product Overview Name Title Microsoft Corporation
  • 2. Agenda • Corporate IM Security Overview • Forefront Solutions Overview • Introduction to Forefront Security for Office Communications Server − Features and Benefits − Core protection and administration capabilities • Summary
  • 3. Corporate IM Environment Security Vulnerabilities are Significant  IM-based malware and spam continue to grow IM  Few organizations have implemented an enterprise IM platform and policies  Even fewer organizations have implemented IM hygiene solutions Compliance is a Primary Concern  IM can be used to subvert corporate information sharing policies  Employees can send and receive confidential or risky documents  IM, like e-mail, is subject to electronic discovery in regulated industries Lack of Corporate-wide IM Strategy  Corporations choose to “block” or not support IM due to avoid risk or perceived “timing wasting”, even though employees can easily work around any restrictions  Reliance on consumer IM applications opens organization to risk. Gartner Group, “Ignoring Instant Messaging at Work Won't Make It Go Away, April 2008
  • 4. Why Secure Enterprise IM?  IM has penetrated over 90% of organizations with consumer- based tools predominant. Wide Spread, Unmanaged Use  In organizations where IM is “not allowed” or “unsupported”, employees consistently use tools like meebo.com to overcome restrictions  Public network IM is unencrypted and easy to intercept  Malicious-code attacks via consumer IM services have been Network Security increasing for several years Concerns  Consumer IM introduces different protocols that can find ways around enterprise authentication systems  It is difficult to track what has been sent or received via IM. Potential  Companies need to extend enforcement of information-sharing policies to IM, particularly in regulated industries. Corporate Risk  IM can be a potential source of lost of research, analytical data, and other intellectual capital Garrtner Group, “Ignoring Instant Messaging at Work Won't Make It Go Away, April 2008 Garrtner Group, “Consumer IM Applications Could Put Your Company at Risk”, Sept. 2007
  • 5. What is Microsoft Forefront? Microsoft Forefront is a comprehensive line of business security products providing greater protection and control through integration with your existing IT infrastructure, simplified deployment, management, and analysis. Client and Server OS Server Applications Edge
  • 6. Microsoft Forefront Security for Office Communications Server provides fast and effective protection against IM-based malware by including multiple scanning engines from industry-leading security partners in a single solution and helps reduce corporate liability by blocking IM messaging containing inappropriate content.  Integrates multiple antimalware engines Comprehensive Protection  Blocks transfer of dangerous file types  Prevents sharing of out-of-policy content  Optimizes virus scanning on OCS 2007 Integrated Security  Integrates with multiple server roles  Protects federated connections and public IM Simplified  Built-in administrator console Management  Automated signature updates  IM notifications for out-of-policy activity
  • 7. Protects Internal and External IM Access Edge Server Director Server Front-End Server Federated (Trusted) Organization Internet Public IM Networks Remote Users Internal Users Protects OCS 2007 and OCS 2007 R2
  • 8. Harnessing Multiple Scanning Technologies in a Single Solution • Forefront Security for Office Communications Server harnesses the strengths of multiple antivirus scan engines from Microsoft and industry-leading security partners − All engines are delivered and licensed by Forefront • Forefront Security for Office Communications Server can all or a subset of its five engines per scanning operation A B C Office Communications D Server 2007 E
  • 9. The Multiple Engine Advantage Response time1 (in hours) Single-engine solutions WildList Malware Rapid response to Number Name FSOCS Engines Vendor A* Vendor B* Vendor C* new threats 10/08 agent_itw69.ex_ 0.00 0.00 226.88 0.00 10/08 autorun_itw463.ex_ 0.00 115.62 109.38 126.08 Fail-safe protection 10/08 autorun_itw476.ex_ 0.00 152.98 1039.35 570.82 through redundancy 10/08 ircbot_itw466.ex_ 0.00 0.00 0.00 696.88 10/08 onlinegames_itw593.ex_ 66.48 47.70 115.55 152.42 Diversity of 10/08 rbot_itw2666.ex_ 0.00 0.00 0.00 934.85 10/08 slenfbot_itw21.ex_ 0.00 0.00 0.00 172.75 antivirus engines 10/08 vb_itw163.ex_ 0.00 45.17 0.00 0.00 and heuristics 10/08 zbot_itw18.ex_ 0.00 1195.55 473.87 463.32 11/08 agent_itw75.ex_ 0.00 71.70 45.43 705.37 11/08 auraax_itw1.ex_ 0.00 74.73 50.03 61.87 11/08 autorun_itw490.ex_ 0.00 0.00 75.23 394.33 11/08 bagle_itw199.ex_ 10.52 60.67 561.95 257.63 11/08 ircbot_itw470.ex_ 0.00 150.88 336.37 1034.00 11/08 krap_itw1.ex_ 0.00 45.80 0.00 154.07 11/08 magania_itw13.ex_ 0.00 45.80 67.55 103.87 11/08 rbot_itw2668.ex_ 0.00 0.00 0.00 1156.45 11/08 sdbot_itw2685.ex_ 0.00 43.48 709.07 1022.70 = Less than 5 hours 11/08 slenfbot_itw26.ex_ 0.00 75.37 0.00 182.88 = 5 to 24 hours 11/08 slenping_itw3.ex_ 0.00 51.60 0.00 1058.47 12/08 agent_itw82.ex_ 0.00 49.58 71.62 35.32 = More than 24 hours 12/08 autorun_itw511.ex_ 0.00 78.43 74.92 64.17 12/08 ircbot_itw474.ex_ 0.00 176.23 0.00 139.32 12/08 koobface_itw9.ex_ 0.00 41.22 0.00 1182.03 12/08 sdbot_itw2686.ex_ 0.00 63.07 709.15 1227.40 12/08 zbot_itw27.ex_ 0.00 1274.87 1059.32 1215.45 ** 0.00 denotes proactive detection 1 Source: AV-Test.org 2008 (www.av-test.org)
  • 10. Help Reduce Corporate Liability • Block dangerous or unwanted files − By type and extension– blocks files (.exe) that could carry malicious code or (.mp3) that violate corporate policy − By file name – block dangerous named files before a signature is available. • Prevent sharing of inappropriate content: − Includes installable word lists in 11 languages to automatically block messages and file transfers containing profanity and discriminatory content. − Allows administrators to define keywords to prevent sharing of corporate confidential or unauthorized information.
  • 11. Forefront Administrator • Provides local and remote management and configuration of: − Scan Jobs − Content Filters − Updates − Incidents − Statistics − Quarantine • Automates updates for all included scan engines − No administrator action required
  • 12. Notify Users of IM Policies • Automatically notify users when they attempt to share malware, unwanted file types, or out-of-policy keywords. • Can be configured separately for internal and external users − IM admin receives e-mail notification − Sender (and recipient if desired) receive IM communication User IM Notification
  • 13. Summary • Organizations need to manage and secure enterprise IM • Forefront Security for Office Communications Server − Provides fast and effective protection against IM-based malware − Helps reduce corporate liability by preventing inappropriate content from being shared in IM − Simplifies management with easy-to-use administrator console, automated updates and notifications on out-of-policy conduct.
  • 14. Next Steps • Read more about Forefront Security for Office Communications Server − http://www.microsoft.com/forefront/serversecurity/ocs/d efault.mspx • Download the trial software − http://technet.microsoft.com/evalcenter/cc509001.aspx • View the webcast − http://msevents.microsoft.com/CUI/EventDetail.aspx?E ventID=1032377127&Culture=en-US
  • 15. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.