Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education Colloquium Institutions SEAL Program IA Courseware Evaluation Program Institutions Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

Archived Security Configuration Guides

NSA has developed and maintained configuration guidance for a number of products. Over time these products age, are superceded by newer versions, or are no longer used. As such, NSA may choose to discontinue maintenance and archive some of these guides.

Application Guides Last Reviewed File Size Revised
Hidden Data and Metadata in Adobe PDF Files June 2012 1,210KB Jul 08
Oracle Application Server Security Recommendations and DoDI 8500.2 IA Controls June 2012 294KB Dec 06
Oracle Application Server on Windows 2003 Security Guide June 2012 332KB Dec 06
Guide to Microsoft .NET Framework Security Mar 09 1,995KB 11 Nov 06
BEA WebLogic Platform Security Guide June 2012 840 KB Apr 05
Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Guide June 2012 589KB Feb 05
Guide to Secure Configuration and Administration of Microsoft Exchange 2000 June 2012 4,200KB Dec 04
Microsoft Office 2000 Executable Content Security Risk and Countermeasures June 2012 806KB  
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 June 2012 800KB  
Guide to Secure Configuration and Administration of Microsoft Exchange 5.x Mar 09 748KB 10 Nov 03
Microsoft Office 97 Executable Content Security Risk and Countermeasures Mar 09 284KB 10 Nov 03
Guide to Using DoD PKI Certificates in Outlook 2000 Mar 09 114KB 09 Jun 05
Router Guides Last Reviewed File Size Revised
Router Security Configuration Guide Supplement - Security for IPv6 Routers, Version 1.0 June 2012 2,681KB 23 May 06
Router Security Configuration Guide, Executive Summary June 2012 161KB 10 Feb 03
Router Security Configuration Guide, Version 1.1c June 2012 3,042KB 15 Dec 05
Fact Sheets Last Reviewed File Size Revised
Securing IBM Lotus Sametime June 2012 337KB Jan 2011
Cisco Unified Presence Server (CUPS) Fact Sheet June 2012 555KB Nov 2010
Application Whitelisting Trifold June 2012 751KB Aug 2010
Encrypting Files with SecureZip June 2012 470KB Jan 2011
Social Networking Sites June 2012 256KB Dec 2009
Exchanging Files with PGP June 2012 294KB Dec 2009
Windows Fine-Grained Password Policies June 2012 61KB May 2009
Mitigation Monday #2: Defense Against Drive-By Downloads June 2012 107KB Jun 09
Encrypting Files with WinZip® June 2012 624KB Jul 09
Securing Fibre Channel Storage Area Networks June 2012 3.32MB Mar 09
Securing Supervisory Control and Data Acquisition (SCADA) and Control Systems (CS) June 2012 107KB Feb 09
Service Oriented Architecture Security Vulnerabilities - Web Services June 2012 213KB Nov 08
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" June 2012 304KB Sep 08
Minimize the Effectiveness of SQL Injection Attacks June 2012 128KB May 08
802.11 Wireless LAN Intrusion Detection Systems June 2012 160KB May 08
Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 June 2012 364KB May 08
Video Teleconferencing (VTC) June 2012 748KB Mar 08
Disabling USB Storage Drives June 2012 816KB Mar 08
The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 June 2012 65 KB Feb 08
A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) June 2012 225 KB Feb 08
Internet Protocol version 6 Factsheet June 2012 82KB Jan 08
Port Security on Cisco Access Switches Factsheet June 2012 82KB Jan 08
Bluetooth Security June 2012 856KB Dec 07
Hardening Tips for the Red Hat Enterprise Linux 5 June 2012 239KB Nov 07
Data Execution Prevention (DEP) June 2012 170KB Oct 07
How to Securely Configure Microsoft Windows Vista BitLocker June 2012 1,049KB Aug 07
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console June 2012 233KB May 07
Configuring a Cisco Router for Remote Administration Using the Router Console June 2012 245KB May 07
Biometrics Security Considerations June 2012 282KB Apr 07
Secure Instant Messaging June 2012 224KB Feb 07
Security Guidance for Using Mail Clients June 2012 247KB Feb 07
Enterprise Firewall Types June 2012 108KB Aug 06
Desktop or Enterprise Firewall? June 2012 72KB Aug 06
Enterprise Firewalls in Encrypted Environments June 2012 64KB Aug 06
       
Operating Systems Last Reviewed File Size Revised
Guide to Secure Configuration of Red Hat Enterprise Linux 5 Feb 11 1.12MB Feb 11
Hardening Tips for MAC OS X 10.6 Snow Leopard June 2012 544K Oct 2010
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Sep 10 1.60MB 14 Sep 10
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Mar 09 996KB 19 Nov 07
Guide to Secure Configuration of Solaris 8 Mar 09 558KB 21 Jul 04
Supporting Documents Last Reviewed File Size Revised
Cloud Computing Guidance June 2012 118KB July 1
VMware ESX Server 3 Configuration Guide June 2012 608KB Mar 08
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF June 2012 1.40MB Mar 08
Microsoft® Office Groove® Security Architecture June 2012 768KB Apr 07
How to Secure a Groove Manager Web Site June 2012 148KB
Web Application Security Overview June 2012 2,645KB
The 60 minute Network Security Guide June 2012 820KB 15 May 06
Outlook E-mail Security in the Midst of Malicious Code Attacks June 2012 412KB 18 Apr 05
Defense in Depth June 2012 131KB  
Guide to Sun Microsystems Java Plug-in Security June 2012 288KB 01 Apr 04
The Case for Using Layered Defenses to Stop Worms June 2012 174KB  
E-mail Security in the Wake of Recent Malicious Code Incidents Mar 09 439KB 14 Aug 02
Web Servers and Browser Guides Last Reviewed File Size Revised
Secure Configuration of the Apache Web Server, Apache Server Version 1.3.3 on Red Hat Linux 5.1 Mar 09 447KB 10 Nov 03
Guide to the Secure Configuration and Administration of iPlanet Web Server, Enterprise Edition 4.1 Mar 09 425KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 Mar 09 696KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 (Checklist Format) Mar 09 547KB 10 Nov 03
Guide to Securing Netscape 7.02 Mar 09 346KB 24 Jun 03
Windows NT Guides Last Reviewed File Size Revised
Zipped Windows NT Security Configuration Guides Mar 09 1,285KB 08 Jan 06
Windows 2000 Guides Last Reviewed File Size Revised
SCERegVl.INF Mar 09 13KB 5 Mar 03
W2kDC.INF Mar 09 32KB 5 Mar 03
W2K DOMAIN POLICY.INF Mar 09 4KB  
W2k Server.INF Mar 09 32KB 5 Mar 03
W2k Workstation.INF Mar 09 31KB 5 Mar 03
ISA.INF Mar 09 1KB  
Microsoft Windows 2000 Network Architecture Guide Mar 09 227KB  
Guide to Securing Microsoft Windows 2000 Group Policy Mar 09 328KB  
Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set 1.2.2 Mar 09 755KB 12 Sep 06
Group Policy Reference Mar 09 769KB  
Guide to Securing Microsoft Windows 2000 Active Directory Mar 09 611KB  
Guide to Securing Microsoft Windows 2000 DNS Mar 09 372KB  
Guide to Securing Microsoft Windows 2000 Encrypting File System Mar 09 218KB  
Guide to Securing Microsoft Windows 2000 File and Disk Resources Mar 09 420KB  
Guide to Securing Microsoft Windows 2000 Schema Mar 09 133KB  
Guide to Securing Microsoft Windows NT/9x Clients in a Windows 2000 Network Mar 09 231KB  
Guide to Secure Configuration and Administration of Microsoft ISA Server 2000 Mar 09 1,469KB  
Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services Mar 09 1,432KB  
Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services (Checklist Format) Mar 09 1,167KB  
Guide to Secure Configuration and Administration of Microsoft Internet Information Services 5.0 version 1.4 Mar 09 2,731KB 16 JAN 04
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 Mar 09 800KB  
Guide to Windows 2000 Kerberos Settings Mar 09 369KB  
Microsoft Windows 2000 Router Configuration Guide Mar 09 688KB  
Guide to Securing Microsoft Windows 2000 DHCP Mar 09 337KB  
Guide to Securing Microsoft Windows 2000 Terminal Services Mar 09 662KB  
Microsoft Windows 2000 IPsec Guide Mar 09 1,330KB  
Guide to Secure Configuration and Administration of Microsoft Exchange 2000 Mar 09 4,200KB 15 Dec 04
Zipped Windows 2000 Security Configuration Guides** (zip file) Mar 09 16,300KB 28 Oct 05
Apple Mac OS X 10.5 'Leopard' Guides Last Reviewed File Size Revised
Mac OS X Security Configuration for Version 10.5 Leopard Second Edition Mar 09 3.5MB  
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" Mar 09 304KB Sep 08
Apple Mac OS X 10.4 'Tiger' Guides Last Reviewed File Size Revised
Mac OS X Security Configuration For Version 10.4 or Later, Second Edition Mar 09 2.98MB  
Mac OS X Server Security Configuration For Version 10.4 or Later, Second Edition Mar 09 5.98MB  
Apple Mac OS X 10.3 'Panther' Guides Last Reviewed File Size Revised
Apple Mac OS X v10.3.x "Panther" Security Configuration Guide Mar 09 2533KB  
Apple Mac OS X Server v10.3.x "Panther" Security Configuration Guide Mar 09 876KB  
Web Server and Browser Guides Last Reviewed File Size Revised
Guide to Secure Configuration and Administration of Microsoft Internet Information Services 5.0 version 1.4 Mar 09 2,731KB 16 Jan 04
Guide to Securing Microsoft Internet Explorer 5.5 Using Group Policy Mar 09 147KB  
VoIP and IP Telephony Last Reviewed File Size Revised
Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3 June 2012 86KB Apr 10
Activating Authentication and Encryption for Cisco CallManager 4.(x) June 2012 919KB Apr 08
Security Guidance for Deploying IP Telephony Systems June 2012 872KB 14 Feb 06
Recommended IP Telephony Architecture June 2012 232KB 01 May 06
Vulnerability Technical Reports Last Reviewed File Size Revised
Best Practices for Storage Networks June 2012 605KB 18 Oct 07
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted from Word to PDF June 2012 1.38MB 18 Mar 08
Wireless Guides Last Reviewed File Size Revised
Guidelines for the Development and Evaluation of IEEE 802.11 Intrusion Detection Systems (IDS) June 2012 527KB 01 Nov 05
System Level IA Guidance Last Reviewed File Size Revised
SSE-100-1, National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System 14 Dec 05 2,287KB 14 Dec 05
Guidance for Addressing Malicious Code Risk 10 Sep 07 296KB 10 Sep 07
Trusted Computing Last Reviewed File Size Revised
Host and Network Integrity Through Trusted Computing - - -
       
       

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: July 11, 2013 | Last Reviewed: July 11, 2013

 
bottom