Unified, Easy-To-Manage Endpoint Security

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Unified, Easy-to-Manage Endpoint Security

Microsoft® Forefront Client Security protects

laptops, desktops, and file

servers with integrated protection against

malware. It simplifies

control of endpoint security and provides better visibility into the overall protection of the environment. Defenses are easily managed from the Microsoft Forefront Management Console code-named “Stirling.”

Protect Business Continuity with Improved Management

of Endpoint Security

The release of the next generation of Forefront client security protects business

laptops, desktops, and file servers against viruses, spyware, rootkits, and other malware. The solution includes: on Windows firewall activities. The agent incorporates proven technologies already in use on millions of computers worldwide and is backed by efficient and effective

threat response from the Microsoft

Malware Protection Center.

n

A single agent that provides antivirus and antispyware protection, vulnerability

assessment and remediation, and host

firewall management.

Forefront Client Security is designed to

simplify administration and save valuable

time through its single management

console and policy configuration,

central update infrastructure, and

automated endpoint discovery. It also integrates with existing investments in Microsoft technologies.

n

A central management server that enables administrators to configure, update, and report on agent activity across the enterprise.

The two components work together to provide unmatched visibility and control over the security of endpoints throughout your environment. The solution allows you to reduce risk and prevent threats from interrupting business through:

To reduce risk, Forefront Client Security

improves visibility into endpoint security with a dashboard, drill-down investigation capabilities, and state-assessment scans. These tools offer high levels of transparency across the enterprise, giving you the

www.microsoft.com/ forefront/clientsecurity

The Beta 2 release of the

n

Rapid deployment of the latest threat next generation of Forefront

Client Security can help you

improve operational efficiency through improved visibility into the security of Windows® client and server operating systems. Forefront Client Security also lowers deployment

and administration costs by

integrating with your existing

Microsoft infrastructure, information you need to quickly respond to

security incidents and organizational risk. definitions and updates.

n

Detection and remediation

of vulnerabilities.

n

Easy investigation

into security incidents

and alerts.

How Forefront Client Security protects your Windows-based infrastructure

including:

n

Windows Vista®

n

Forefront Client Security

provides comprehensive, unified protection
Windows Update Services

n

SQL Server®

n

Active Directory® with its single agent

that scans for viruses, spyware, and rootkits in real time. It also blocks

generic exploits by

n

Microsoft System Center

Configuration Manager

n

Microsoft System Center Operations Manager managing and reporting

Forefront Client Security provides unified protection of desktops, laptops, and server operating systems.

security policy and enforce necessary

updates using built-in integration with Microsoft Network Access Protection. new endpoints as they come onto the network, making it easy to deploy

security agents and helping to ensure

protection for all endpoints.

Key Features

The Beta 2 release of the next generation

of Forefront Client Security provides unified protection, simplified administration, and critical visibility and control for securing laptops, desktops, and file servers.

n

Controls external devices Help contain

the spread of malware by enabling restrictions against removable storage devices such as USB drives.

Critical visibility and control

n

Assesses your security state Measure

your organization’s risk profile against

security best practices, using security

state scanning and reporting.

Unified protection
Simplified administration

n

Stops malware without impacting

n

Centralizes control Use a single console

to configure, deploy, update, and report on enterprise-wide endpoint security— the same console where you manage

the protection of your messaging and

collaboration servers.

productivity Use single security

agent scans efficiently, protecting endpoints without significantly impacting user productivity.

n

Provides in-depth investigation Drill

down to investigate specific security incidents with a single click in the easyto-use dashboard.

n

Eliminates vulnerabilities

n

Reports on key security trends Use

Detect common vulnerabilities,

n

Simplifies deployment and

updating Take advantage of

integration with System Center

technologies for easy deployment

of agents and signature updates. in-depth historical and trending reports to enhance insight into and control over malware threats. misconfigurations, and missing security updates. Remediate these automatically through defined policies or remotely using the management console.

n

Monitors endpoint security alerts and health Configure security alerts

across enterprise IT roles. Use integrated

health monitoring to help ensure that endpoint protection is performing

correctly at all times.

n

Enforces endpoint compliance Keep

n

Automates endpoint discovery Use

Active Directory integration to discover endpoints in compliance with corporate

Integrated view of endpoint security
For more information about Forefront Client Security, visit www.microsoft.com/forefront/ clientsecurity.

Forefront Client Security Summary Report

System Requirements

2.8 GHz processor; 2 GB of RAM or more; 20 GB of available hard-disk space or more required; Microsoft Windows Server® 2003 Standard Edition with Service Pack 2 or Windows Server 2008 operating system; Microsoft SQL Server 2005 Standard Edition with Service Pack 2 or later (including Database Services, Reporting Services, Workstation Components, and Integration Services); Windows Installer 3.1; Microsoft .NET Framework 3.0; Windows PowerShell™ 1.0; Visual C++® 2005 Redistributable Package with Service Pack 1; Windows Server Update Services 3.0; Microsoft Message Queuing (MSMQ) (part of Microsoft Windows Server 2003); Microsoft CORE XML Services (MSXML) 6.0; Windows Update Agent 3.0; Microsoft System Center Operations Manager 2007 with Service Pack 1.

©2009 Microsoft Corporation. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

Recommended publications
  • Impact 360 Content Producer Installation and Upgrade Guide 5

    Impact 360 Content Producer Installation and Upgrade Guide 5

    Content Producer Installation and Upgrade Guide Version 11.1 Document Revision 1.00 Confidential and Proprietary Information of Verint Systems Inc. 11/540,185; US 11/540,320; US 11/540,900; US 11/540,902; © 1992–2012 Verint Systems Inc. All Rights Reserved Worldwide. US 11/567,808; US 11/567,852; US 11/583,381; US Confidential and Proprietary Information of Verint Systems Inc. 11/608,340; US 11/608,350; US 11/608,358; US 11/616,490; US 11/621,134; US 11/691,530; US 11/692,983; US All materials (regardless of form and including, without 11/693,828; US 11/693,923; US 11/693,933; US 11/712,933; US 11/723,010; US 11/742,733; US 11/752,458; US limitation, software applications, documentation, and any other 11/776,659; US 11/824,980; US 11/831,250; US 11/831,257; information relating to Verint Systems, its products or services) are the exclusive property of Verint Systems Inc. Only expressly US 11/831,260; US 11/831,634; US 11/844,759; US 11/872,575; US 11/924,201; US 11/937,553; US 11/959,650; authorized individuals under obligations of confidentiality are US 11/968,428; US 12/015,375; US 12/015,621; US permitted to review materials in this document. By reviewing these materials, you agree to not disclose these materials to any 12/053,788; US 12/055,102; US 12/057,442; US 12/057,476; US 12/107,976; US 12/118,789; US 12/118,792; US third party unless expressly authorized by Verint Systems, and 12/164,480; US 12/245,781; US 12/326,205; US 12/351,370; to protect the materials as confidential and trade secret information.
  • User Manual TREK-722/723

    User Manual TREK-722/723

    User Manual TREK-722/723 RISC All-In-One Mobile Data Terminal Copyright The documentation and the software included with this product are copyrighted 2012 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable. How- ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe- ments of the rights of third parties, which may result from its use. Acknowledgements TI and AM37x are trademarks of Texas Instruments.. Microsoft Windows is registered trademarks of Microsoft Corp. All other product names or trademarks are properties of their respective owners. Product Warranty (2 years) Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for two years from the date of pur- chase. This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation. Advantech assumes no liability under the terms of this warranty as a consequence of such events. Because of Advantech’s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defec- tive, it will be repaired or replaced at no charge during the warranty period.
  • HTTP Client API for Jscript

    HTTP Client API for Jscript

    HTTP Client API for JScript Version 9.7 April 2015 This document applies to HTTP Client API for JScript Version 9.7. Specifications contained herein are subject to change and these changes will be reported in subsequent release notes or new editions. Copyright © 1999-2015 Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors. The name Software AG and all Software AG product names are either trademarks or registered trademarks of Software AG and/or Software AG USA, Inc. and/or its subsidiaries and/or its affiliates and/or their licensors. Other company and product names mentioned herein may be trademarks of their respective owners. Detailed information on trademarks and patents owned by Software AG and/or its subsidiaries is located at http://softwareag.com/licenses. Use of this software is subject to adherence to Software AG's licensing conditions and terms. These terms are part of the product documentation, located at http://softwareag.com/licenses/ and/or in the root installation directory of the licensed product(s). This software may include portions of third-party products. For third-party copyright notices, license terms, additional rights or re- strictions, please refer to "License Texts, Copyright Notices and Disclaimers of Third-Party Products". For certain specific third-party license restrictions, please refer to section E of the Legal Notices available under "License Terms and Conditions for Use of Software AG Products / Copyright and Trademark Notices of Software AG Products". These documents are part of the product documentation, located at http://softwareag.com/licenses and/or in the root installation directory of the licensed product(s).
  • Microsoft Security Intelligence Report

    Microsoft Security Intelligence Report

    Microsoft Security Intelligence Report Volume 12 July through December, 2011 www.microsoft.com/sir Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2012 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. JULY–DECEMBER 2011 i Authors Dennis Batchelder David Felstead Ken Malcolmson Tim Rains Microsoft Protection Bing Microsoft Trustworthy Microsoft Trustworthy Technologies Computing Computing Paul Henry Shah Bawany Wadeware LLC Nam Ng Frank Simorjay Microsoft Windows Safety Microsoft Trustworthy Microsoft Trustworthy Platform Nitin Kumar Goel Computing Computing Microsoft Security Joe Blackbird Response Center Mark Oram Holly Stewart Microsoft Malware Microsoft Trustworthy Microsoft Malware Protection Center Jeff Jones Computing Protection Center Microsoft Trustworthy Eve Blakemore Computing Daryl Pecelj Matt Thomlinson Microsoft Trustworthy Microsoft IT Information Microsoft Trustworthy Computing Jimmy Kuo Security and Risk Computing Microsoft Malware Management Joe Faulhaber Protection Center Scott Wu Microsoft Malware Dave Probert Microsoft Malware Protection Center Marc Lauricella Microsoft
  • ANSYS, Inc. Installation Guide for Windows

    ANSYS, Inc. Installation Guide for Windows

    Installation Guide for Windows ANSYS, Inc. Release 16.2 Southpointe July 2015 2600 ANSYS Drive ANSYS, Inc. is Canonsburg, PA 15317 certified to ISO [email protected] 9001:2008. http://www.ansys.com (T) 724-746-3304 (F) 724-514-9494 Revision Information The information in this guide applies to all ANSYS, Inc. products released on or after this date, until superseded by a newer version of this guide. This guide replaces individual product installation guides from previous releases. Copyright and Trademark Information © 2015 SAS IP, Inc. All rights reserved. Unauthorized use, distribution or duplication is prohibited. ANSYS, ANSYS Workbench, Ansoft, AUTODYN, EKM, Engineering Knowledge Manager, CFX, FLUENT, HFSS, AIM and any and all ANSYS, Inc. brand, product, service and feature names, logos and slogans are registered trademarks or trademarks of ANSYS, Inc. or its subsidiaries in the United States or other countries. ICEM CFD is a trademark used by ANSYS, Inc. under license. CFX is a trademark of Sony Corporation in Japan. All other brand, product, service and feature names or trademarks are the property of their respective owners. Disclaimer Notice THIS ANSYS SOFTWARE PRODUCT AND PROGRAM DOCUMENTATION INCLUDE TRADE SECRETS AND ARE CONFID- ENTIAL AND PROPRIETARY PRODUCTS OF ANSYS, INC., ITS SUBSIDIARIES, OR LICENSORS. The software products and documentation are furnished by ANSYS, Inc., its subsidiaries, or affiliates under a software license agreement that contains provisions concerning non-disclosure, copying, length and nature of use, compliance with exporting laws, warranties, disclaimers, limitations of liability, and remedies, and other provisions. The software products and documentation may be used, disclosed, transferred, or copied only in accordance with the terms and conditions of that software license agreement.
  • Esker Fax 5.0 — Technical Specifications

    Esker Fax 5.0 — Technical Specifications

    DATASHEET Esker Fax 5.0 — Technical Specifications Supported formats Minimum requirements § Text Computer hardware § XML § Pentium® III 2 GHz CPU (3.2 GHz hyper-threaded, multi-core or multi- § PCL, PostScript (excluding bitmap fonts) processor recommended to use the Image Recognition module) § PDF (excluding bitmap fonts) § 3 GB RAM (or 4 GB if using Image Recognition) § Images (TIFF, JPEG, BMP, etc.) § 700 MB hard disk space for program installation + 2 GB for database, § Windows applications (Word, Excel, etc.) depending on expected volumes (20 GB recommended) § AFP § NTFS file system § RTF § Network interface card § EBCDIC text § Video card with 8 MB RAM for optimal performance Client applications Fax hardware § LanFax Manager — desktop client for Windows Vista, XP, 2000 § Dialogic® Brooktrout® TruFax® TR1034 Fax Board, or § LanFax Outlook client § Dialogic® Brooktrout® SR140 Fax Software, or § Document Manager — web-based .NET user interface (uses Microsoft § Dialogic® Diva® Board or .NET Framework v3.5) § TAPI modem class 1, 2, 2.0, or 2.1 Telephony communications Operating system* § Analog Loop Start § Windows Server® 2003 R2 or Windows Server 2003 SP2 (32-bit or 64-bit § Analog DID/DTMF Standard Edition, Enterprise Edition, or Datacenter Edition)*, or § Digital T1 (up to two T1 lines per server) § Windows Server 2008 (32-bit or 64-bit Standard Edition, Enterprise § ISDN BRI Edition, or Datacenter Edition)* § ISDN PRI (E1/T1) *With the latest Windows updates Enterprise fax capabilities Companion software § Esker DeliveryWare Rules
  • ATLAS.Ti 6 User's Guide and Reference

    ATLAS.Ti 6 User's Guide and Reference

    ATLAS.ti 6 User Guide and Reference 2 ATLAS.ti 6 User Manual Copyright ©2011 by ATLAS.ti Scientific Software Development GmbH, Berlin. All rights reserved. Version: 339.20111116 Author: Dr. Susanne Friese (QUARC Consulting) Realization/Programming: Dr. Thomas G. Ringmayr (www.hypertexxt.com) Copying or duplicating this manual or any part thereof is a violation of applicable law. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including, but not limited to, photocopying, without written permission from ATLAS.ti GmbH. Trademarks: ATLAS.ti is a registered trademark of ATLAS.ti Scientific Software Development GmbH. Adobe Acrobat is a trademark of Adobe Systems Incorporated; Microsoft, Windows, Excel, and other Microsoft products referenced herein are either trademarks of Microsoft Corporation in the United States and/or in other countries. Google Earth is a trademark of Google, Inc. All other product names and any registered and unregistered trademarks mentioned in this document are used for identification purposes only and remain the exclusive property of their respective owners. ATLAS.ti 6 USER MANUAL 3 Contents About this Manual..................................................................................................................18 How to Use This Manual.................................................................................................................................................................18 Manual Conventions .......................................................................................................................................................................19
  • Altova Authentic 2021 Browser Edition

    Altova Authentic 2021 Browser Edition

    Altova Authentic 2021 Browser Edition User & Reference Manual Altova Authentic 2021 Browser Edition User & Reference Manual All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Published: 2021 © 2015-2021 Altova GmbH Table of Contents 1 Introduction 6 1.1 Benefit.s.. ..o..f.. .A...u...t.h...e..n...t.i.c... .B....r.o...w....s..e...r.......................................................................................................... 7 1.2 How It W.....o...r..k..s.............................................................................................................................................. 8 1.3 Authen...t.i.c... .B....r.o...w....s..e...r.. .V...e...r.s...i.o...n..s............................................................................................................. 10 1.4 About ..T...h..i.s... .D....o...c..u...m....e...n...t.a...t.i.o...n............................................................................................................... 12 2 Server Setup 13 2.1 IIS: Co..n...f.i.g...u...r.i.n...g..
  • SPC-65 6.4” TFT LCD Smart Panel ® ® Computer with Intel Xscale CPU ® & Windows CE.5.0 Users Manual Copyright This Document Is Copyrighted, © 2006

    SPC-65 6.4” TFT LCD Smart Panel ® ® Computer with Intel Xscale CPU ® & Windows CE.5.0 Users Manual Copyright This Document Is Copyrighted, © 2006

    SPC-65 6.4” TFT LCD Smart Panel ® ® Computer with Intel Xscale CPU ® & Windows CE.5.0 Users Manual Copyright This document is copyrighted, © 2006. All rights are reserved. The original manufacturer reserves the right to make improvements to the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of the original manufacturer. Information provided in this manual is intended to be accurate and reliable. However, the original manufacturer assumes no responsibility for its use, nor for any infringements upon the rights of third parties that may result from such use. Acknowledgements IBM, PC/AT, PS/2 and VGA are trademarks of International Business Machines Corporation. Intel® is trademark of Intel Corporation. Microsoft® Windows® CE 5.0 is a registered trademark of Microsoft Corp. All other product names or trademarks are properties of their respective owners. For more information on this and other Advantech products, please visit our websites at: http://www.advantech.com For technical support and service, please visit our support website at: http://eservice.advantech.com.tw/eservice/ This manual is for the SPC-65 series products. 1st. Edition: September 2006 FCC Class A This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential environment. This equipment generates, uses, and can radiate radio frequency energy.
  • WASP3D Techspecs Videowall.Pdf

    WASP3D Techspecs Videowall.Pdf

    WASP3D Solution - Video wall Hardware & Technical Specs VERSION 3.5 Minimum Hardware & Software Configuration for WASP3D – Video wall Solution: Processor: Minimum 6 Cores, @ 3.00 GHz, Cache: 15 MB 6 Cores: Intel Xeon E5-1650 v3 @ 3.50GHz; Intel Xeon E5-1660 v2 @ 3.70GHz; Intel Xeon E5-2643 v3 @ 3.40GHz. 8 Cores: Intel Xeon E5-1660 v3 @ 3.00GHz; Intel Xeon E5-1680 v2 @ 3.00GHz; Intel Xeon E5-1680 v3 @ 3.20GHz; Intel Xeon E5-2667 v2 @ 3.30GHz; Intel Xeon E5-2667 v3 @ 3.20GHz; Intel Xeon E5-2687W v2 @ 3.40GHz. 10 Cores: Intel Xeon E5-2687W v3 @ 3.10GHz; Intel Xeon E5-2690 v2 @ 3.00GHz. Core i7: Intel Core i7-5960X @ 3.00GHz; Intel Core i7-5930K @ 3.50GHz; Intel Core i7-5820K @ 3.30GHz. Motherboard: Choose a compatible Motherboard as per processor with Dual PCI-e x16 Slots (VGA and Video I/O Card) C602 /C612 Chipset and X99 Chipset (Core i7 Family). RAM: Minimum 8 GB. Hard Drive: SSD 240 GB or SATA III 6 Gbps 250 GB Graphic card: Nvidia GeForce GTX 980/ GTX 980Ti/GTX TITAN X SMPS: Minimum 650/850 Watt or above. (Consult with the Hardware supplier) Monitor: Recommended 24” 1920 X 1080 Supported screen. Branded Systems: Windows 10 Pro/Ent. 64 Bit or Windows 7 Pro /Ent. 64 Bit-SP1 • HP Z440 with Intel Xeon E5-1650 v3 3.5 or Higher + 8 GB RAM + Graphics card GTX 980/GTX 980Ti. • HP Z640 with Intel Xeon E5-1650 v3 3.5 or Higher + 8 GB RAM + Graphics card GTX 980/GTX 980Ti.
  • Microsoft Forefront Client Security FAQ

    Microsoft Forefront Client Security FAQ

    Microsoft Forefront Client Security FAQ Q. What is Microsoft Forefront? A. The Microsoft Forefront comprehensive family of business security products provides greater protection and control over the security of your network infrastructure. Microsoft Forefront security products easily integrate with each other and with your organization’s IT infrastructure; they can be supplemented through interoperable third-party solutions, enabling end-to-end, defense-in-depth security solutions. Microsoft Forefront includes: Microsoft Internet Security and Acceleration Server (ISA) 2006. Intelligent Application Gateway (IAG). Forefront Security for Exchange Server. Forefront Security for SharePoint. Forefront Security for Office Communications Server. Forefront Client Security. Simplified management, analysis, and deployment enable you to efficiently protect your organization’s information resources, and help secure access to applications and servers. With highly responsive protection supported by Microsoft technical guidance, Microsoft Forefront helps you confidently meet ever-changing threats and increased business demands. For more information, please visit the Microsoft Forefront Web site. Q. What is Microsoft Forefront Client Security? A. Microsoft Forefront Client Security provides unified malware protection for business desktops, laptops, and server operating systems that is easier to manage and control. Built on the same highly successful Microsoft protection technology already used by millions of people worldwide, Forefront Client Security helps guard against emerging threats, such as spyware and rootkits, as well as traditional threats, such as viruses, worms, and Trojan horses. Forefront Client Security integrates with your existing infrastructure software, such as Active Directory, and complements other Microsoft security technologies for enhanced protection and greater control. Q. What value does Microsoft Forefront Client Security deliver to customers? A.
  • Progress Made, Trends Observed a White Paper from the Microsoft Antimalware Team Msrwindows Malicious Software Removalt Tool

    Progress Made, Trends Observed a White Paper from the Microsoft Antimalware Team Msrwindows Malicious Software Removalt Tool

    Progress Made, Trends Observed A White Paper from the Microsoft Antimalware Team MSRWindows Malicious Software RemovalT Tool Matthew Braverman Program Manager Microsoft Antimalware Team Acknowledgements I would like to thank the following individuals for their contribution to this paper: Mike Chan, Brendan Foley, Jason Garms, Robert Hensing, Ziv Mador, Mady Marinescu, Michael Mitchell, Adam Overton, Matt Thomlinson, and Jeff Williams The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photo- copying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Copyright © 2006 Microsoft Corporation. All rights reserved.