{"id":975,"date":"2008-01-15T10:33:34","date_gmt":"2008-01-15T10:33:34","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm"},"modified":"2008-01-15T10:33:34","modified_gmt":"2008-01-15T10:33:34","slug":"forefront-security-overview","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm","title":{"rendered":"Forefront Security overview"},"content":{"rendered":"<p>A few weeks back, I spent some time learning about the <a href=\"http:\/\/www.microsoft.com\/forefront\/\">Microsoft Forefront<\/a> security products.&#160; I&#8217;ve written before about <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/forefront-client-security.htm\">Forefront Client Security<\/a> and intend to write some more posts that go into some detail on the other Forefront products, but I thought I&#8217;d start by taking a look at the suite as a whole.<\/p>\n<p>The Forefront suite of applications currently includes a number of products: <\/p>\n<ul>\n<li>Client (including client protection on a server):<\/li>\n<ul>\n<li><a href=\"http:\/\/www.microsoft.com\/forefront\/clientsecurity\/\">Forefront Client Security<\/a>.<\/li>\n<\/ul>\n<li>Server:<\/li>\n<ul>\n<li><a href=\"http:\/\/www.microsoft.com\/forefront\/serversecurity\/exchange\/\">Forefront Security for Exchange Server<\/a>.<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/forefront\/serversecurity\/sharepoint\/\">Forefront Security for SharePoint<\/a>.<\/li>\n<\/ul>\n<li>Edge:<\/li>\n<ul>\n<li><a href=\"http:\/\/www.microsoft.com\/isaserver\/\">Internet Security and Acceleration Server<\/a> (ISA)<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/forefront\/edgesecurity\/iag\/\">Intelligent Application Gateway<\/a> (IAG)<\/li>\n<\/ul>\n<\/ul>\n<p>Looking first at the client, Forefront Client Security provides virus and spyware protection in a single product for client and server operating systems with updates received using Microsoft Update.&#160; That all sounds OK but, for some critics, the natural question to ask is &quot;what does Microsoft know about client security?&quot;.&#160; Well, it seems that they know quite a lot:<\/p>\n<ol>\n<li>First, <a href=\"http:\/\/www.microsoft.com\/presspass\/press\/2003\/Jun03\/06-10GeCadPR.mspx\">Microsoft purchased GeCAD Software<\/a> &#8211; a respected Romanian anti-virus vendor.<\/li>\n<li>Next, <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/microsoft-buys-giant-company.htm\">Microsoft purchased GIANT Software<\/a> &#8211; a respected anti-malware provider.<\/li>\n<li>The <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/01\/microsofts-new-malware-removal-and.htm\">Microsoft Malicious Software Removal Tool<\/a> provides more than just the ability to remove malware from PCs as he reporting information helps indicate how widespread a particular issue is.<\/li>\n<li><a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/07\/microsoft-acquires-frontbridge.htm\">Microsoft also purchased FrontBridge Technologies<\/a>, whose scanning technology protects many organisations from viruses and spam.<\/li>\n<li>Another Windows Live service that provides Microsoft with reconnaissance information is the <a href=\"http:\/\/safety.live.com\/\">Windows Live OneCare Safety Scanner<\/a> (indeed the entire OneCare product range &#8211; although these consumer products have little in common with Forefront Client Security).<\/li>\n<li>Oh yes, and the fact that they run <a href=\"http:\/\/mail.live.com\/\">one of the world&#8217;s largest free e-mail services<\/a> won&#8217;t hurt their ability to gather diagnostic information.<\/li>\n<\/ol>\n<p>So that&#8217;s the client &#8211; what about the server products?&#160; Based on the former Antigen products gained with <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/microsoft-buys-into-anti-virus-market.htm\">Microsoft&#8217;s acquisition of Sybari Software<\/a> there are currently two products carrying the Forefront brand name &#8211; plus Microsoft Antigen for Instant Messaging (to be replaced with an OCS-compatible product under the Forefront banner).&#160; Making use of multiple anti-virus engines, the Forefront Server Security products provide realtime and manual scanning for messaging and collaboration products.<\/p>\n<p>Finally, at the edge, ISA Server has been with us since 2000 (we had Proxy Server before then) and has become a well-respected <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/securing-network-using-microsoft-isa.htm\">application-level firewall<\/a> and proxy server that is available in both software-only and appliance formats.&#160; Intelligent Application Gateway (IAG) is a newer product, built around ISA Server by another company that <a href=\"http:\/\/www.microsoft.com\/presspass\/features\/2006\/jul06\/07-26whale.mspx\">Microsoft recently acquired &#8211; Whale Communications<\/a>.&#160; IAG provides SSL VPN capabilities, combined with a detailed understanding of how applications work (positive logic) in order to ensure that only valid traffic is allowed to cross the network boundary.&#160; Whilst IAG is currently only available in appliance format, with Microsoft being a software company I can&#8217;t help feeling that a version of IAG will be released in software form at some point in the future.<\/p>\n<p>Unfortunately, this mix of products from different backgrounds means that Forefront doesn&#8217;t feel as tightly integrated as some other product suites (e.g. Microsoft Office) but that is changing as the components are updated.&#160; In addition, Microsoft has announced a product (<a href=\"http:\/\/www.microsoft.com\/forefront\/prodinfo\/roadmap\/stirling.mspx\">codenamed Stirling<\/a>) which they are touting as:<\/p>\n<blockquote cite=\"http:\/\/www.microsoft.com\/forefront\/prodinfo\/roadmap\/stirling.mspx\"><p>&quot;[&#8230;] a single product that delivers unified security management and reporting with comprehensive, coordinated protection across clients, server applications, and the network edge. Through its deep integration with the existing infrastructure, such as Microsoft Active Directory and Microsoft System Center, customers can reduce complexity, making it easier to achieve a more secure and well-managed infrastructure.&quot;<\/p><\/blockquote>\n<p>For anyone looking at purchasing Forefront products, <a href=\"http:\/\/www.microsoft.com\/licensing\/sa\/\">Software Assurance<\/a> (SA) might not be a bad choice as there are new versions of IAG planned based on the forthcoming ISA Server codename Nitrogen and ISA Server codename Oxygen products (don&#8217;t quote me on this as information is a little sketchy on these!) and further updates planned across the Forefront suite.<\/p>\n<p>IT security is no longer an afterthought and has become an integral part of any organisation&#8217;s IT infrastructure. I&#8217;m impressed by the range of options that Microsoft can provide in the Forefront suite and, if they can convince critics that they have a credible range of products (they are currently suffering from <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/12\/microsoft-security-suffers-from-the-skoda-badge-problem.htm\">&quot;the &#352;koda badge problem&quot;<\/a>), then over time I expect to see Microsoft take a dominant position in Windows Server security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few weeks back, I spent some time learning about the Microsoft Forefront security products.&#160; I&#8217;ve written before about Forefront Client Security and intend to write some more posts that go into some detail on the other Forefront products, but I thought I&#8217;d start by taking a look at the suite as a whole. The &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Forefront Security overview<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[129,150,71],"class_list":["post-975","post","type-post","status-publish","format-standard","hentry","tag-forefront","tag-iag","tag-isa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forefront Security overview - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forefront Security overview - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"A few weeks back, I spent some time learning about the Microsoft Forefront security products.&#160; I&#8217;ve written before about Forefront Client Security and intend to write some more posts that go into some detail on the other Forefront products, but I thought I&#8217;d start by taking a look at the suite as a whole. The &hellip; Continue reading Forefront Security overview\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2008-01-15T10:33:34+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Forefront Security overview\",\"datePublished\":\"2008-01-15T10:33:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm\"},\"wordCount\":730,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Microsoft Forefront\",\"Microsoft Intelligent Application Gateway\",\"Microsoft ISA Server\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm\",\"name\":\"Forefront Security overview - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2008-01-15T10:33:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/01\\\/forefront-security-overview.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forefront Security overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forefront Security overview - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm","og_locale":"en_GB","og_type":"article","og_title":"Forefront Security overview - markwilson.it","og_description":"A few weeks back, I spent some time learning about the Microsoft Forefront security products.&#160; I&#8217;ve written before about Forefront Client Security and intend to write some more posts that go into some detail on the other Forefront products, but I thought I&#8217;d start by taking a look at the suite as a whole. The &hellip; Continue reading Forefront Security overview","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm","og_site_name":"markwilson.it","article_published_time":"2008-01-15T10:33:34+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Forefront Security overview","datePublished":"2008-01-15T10:33:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm"},"wordCount":730,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Microsoft Forefront","Microsoft Intelligent Application Gateway","Microsoft ISA Server"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm","name":"Forefront Security overview - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2008-01-15T10:33:34+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Forefront Security overview"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1070,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/05\/microsoft-licensing-part-6-forefront-security-products.htm","url_meta":{"origin":975,"position":0},"title":"Microsoft Licensing: Part 6 (Forefront security products)","author":"Mark Wilson","date":"Friday 23 May 2008","format":false,"excerpt":"Continuing the series on licensing Microsoft software, in this post I look at the various security products that Microsoft offers. Many of these products are the result of acquisitions, so it may help to look at the old and new product names: Sybari Antigen is now integrated into Forefront Server\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":873,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/forefront-client-security.htm","url_meta":{"origin":975,"position":1},"title":"Forefront Client Security","author":"Mark Wilson","date":"Tuesday 7 August 2007","format":false,"excerpt":"A couple of years back, Microsoft bought a load of security companies and since then we've seen them continue to offer FrontBridge services as Microsoft Exchange Hosted Services; Windows Defender was born out of the previous Giant Company anti-spyware product, and a couple of months back they released Forefront Client\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1485,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/07\/no-new-definitions-or-updates-are-available-for-forefront-client-security-try-microsoft-update.htm","url_meta":{"origin":975,"position":2},"title":"No new definitions or updates are available for Forefront Client Security?  Try Microsoft Update","author":"Mark Wilson","date":"Tuesday 21 July 2009","format":false,"excerpt":"I've seen this problem before on my Windows 7 machines but I thought it was a Windows 7 issue... now I've experienced it in a Windows XP virtual machine and so I thought I'd blog it here. After installing Forefront Client Security (FCS) (the next version of which will be\u2026","rel":"","context":"In \"Microsoft Forefront\"","block_context":{"text":"Microsoft Forefront","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/forefront"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":962,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/12\/microsoft-security-suffers-from-the-skoda-badge-problem.htm","url_meta":{"origin":975,"position":3},"title":"Microsoft security suffers from &#8220;the &#352;koda badge problem&#8221;","author":"Mark Wilson","date":"Monday 17 December 2007","format":false,"excerpt":"I'm attending a Microsoft Forefront Security course and it was interesting to hear the analogy that the instructor used to describe how people perceive Microsoft and security when used in the same sentence... he referred to it as the \u0160koda badge problem - i.e. that everyone knows a modern \u0160koda\u2026","rel":"","context":"In \"Microsoft Forefront\"","block_context":{"text":"Microsoft Forefront","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/forefront"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1284,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","url_meta":{"origin":975,"position":4},"title":"Identity and security developments at Microsoft","author":"Mark Wilson","date":"Thursday 13 November 2008","format":false,"excerpt":"In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it's all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft's Identity and\u2026","rel":"","context":"In \"Microsoft Forefront\"","block_context":{"text":"Microsoft Forefront","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/forefront"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1069,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/05\/microsoft-licensing-part-1-client-and-server.htm","url_meta":{"origin":975,"position":5},"title":"Microsoft Licensing: Part 1 (client and server)","author":"Mark Wilson","date":"Tuesday 13 May 2008","format":false,"excerpt":"A few weeks back, I found myself spending the evening in a conference room at Microsoft's UK headquarters, listening to a presentation about software licensing. For those who say I should get a life - you're probably right and I'm sure there are better things that I could have been\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=975"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/975\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}