| Application Guides |
Last Reviewed |
File Size |
Revised |
| Hidden Data and Metadata in Adobe PDF Files |
June 2012 |
1,210KB |
Jul 08 |
| Oracle Application Server Security Recommendations and DoDI 8500.2 IA Controls |
June 2012 |
294KB |
Dec 06 |
| Oracle Application Server on Windows 2003 Security Guide |
June 2012 |
332KB |
Dec 06 |
| Guide to Microsoft .NET Framework Security |
Mar 09 |
1,995KB |
11 Nov 06 |
| BEA WebLogic Platform Security Guide |
June 2012 |
840 KB |
Apr 05 |
| Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Guide |
June 2012 |
589KB |
Feb 05 |
| Guide to Secure Configuration and Administration of Microsoft Exchange 2000 |
June 2012 |
4,200KB |
Dec 04 |
| Microsoft Office 2000 Executable Content Security Risk and Countermeasures |
June 2012 |
806KB |
|
| Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 |
June 2012 |
800KB |
|
| Guide to Secure Configuration and Administration of Microsoft Exchange 5.x |
Mar 09 |
748KB |
10 Nov 03 |
| Microsoft Office 97 Executable Content Security Risk and Countermeasures |
Mar 09 |
284KB |
10 Nov 03 |
| Guide to Using DoD PKI Certificates in Outlook 2000 |
Mar 09 |
114KB |
09 Jun 05 |
| Router Guides |
Last Reviewed |
File Size |
Revised |
| Router Security Configuration Guide Supplement - Security for IPv6 Routers, Version 1.0 |
June 2012 |
2,681KB |
23 May 06 |
| Router Security Configuration Guide, Executive Summary |
June 2012 |
161KB |
10 Feb 03 |
| Router Security Configuration Guide, Version 1.1c |
June 2012 |
3,042KB |
15 Dec 05 |
| Fact Sheets |
Last Reviewed |
File Size |
Revised |
| Securing IBM Lotus Sametime |
June 2012 |
337KB |
Jan 2011 |
| Cisco Unified Presence Server (CUPS) Fact Sheet |
June 2012 |
555KB |
Nov 2010 |
| Application Whitelisting Trifold |
June 2012 |
751KB |
Aug 2010 |
| Encrypting Files with SecureZip |
June 2012 |
470KB |
Jan 2011 |
| Social Networking Sites |
June 2012 |
256KB |
Dec 2009 |
| Exchanging Files with PGP |
June 2012 |
294KB |
Dec 2009 |
| Windows Fine-Grained Password Policies |
June 2012 |
61KB |
May 2009 |
| Mitigation Monday #2: Defense Against Drive-By Downloads |
June 2012 |
107KB |
Jun 09 |
| Encrypting Files with WinZip® |
June 2012 |
624KB |
Jul 09 |
| Securing Fibre Channel Storage Area Networks |
June 2012 |
3.32MB |
Mar 09 |
| Securing Supervisory Control and Data Acquisition (SCADA) and Control Systems (CS) |
June 2012 |
107KB |
Feb 09 |
| Service Oriented Architecture Security Vulnerabilities - Web Services |
June 2012 |
213KB |
Nov 08 |
| Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" |
June 2012 |
304KB |
Sep 08 |
| Minimize the Effectiveness of SQL Injection Attacks |
June 2012 |
128KB |
May 08 |
| 802.11 Wireless LAN Intrusion Detection Systems |
June 2012 |
160KB |
May 08 |
| Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 |
June 2012 |
364KB |
May 08 |
| Video Teleconferencing (VTC) |
June 2012 |
748KB |
Mar 08 |
| Disabling USB Storage Drives |
June 2012 |
816KB |
Mar 08 |
| The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 |
June 2012 |
65 KB |
Feb 08 |
| A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) |
June 2012 |
225 KB |
Feb 08 |
| Internet Protocol version 6 Factsheet |
June 2012 |
82KB |
Jan 08 |
| Port Security on Cisco Access Switches Factsheet |
June 2012 |
82KB |
Jan 08 |
| Bluetooth Security |
June 2012 |
856KB |
Dec 07 |
| Hardening Tips for the Red Hat Enterprise Linux 5 |
June 2012 |
239KB |
Nov 07 |
| Data Execution Prevention (DEP) |
June 2012 |
170KB |
Oct 07 |
| How to Securely Configure Microsoft Windows Vista BitLocker |
June 2012 |
1,049KB |
Aug 07 |
| Configuring a PC to Remotely Administer a Cisco Router Using the Router Console |
June 2012 |
233KB |
May 07 |
| Configuring a Cisco Router for Remote Administration Using the Router Console |
June 2012 |
245KB |
May 07 |
| Biometrics Security Considerations |
June 2012 |
282KB |
Apr 07 |
| Secure Instant Messaging |
June 2012 |
224KB |
Feb 07 |
| Security Guidance for Using Mail Clients |
June 2012 |
247KB |
Feb 07 |
| Enterprise Firewall Types |
June 2012 |
108KB |
Aug 06 |
| Desktop or Enterprise Firewall? |
June 2012 |
72KB |
Aug 06 |
| Enterprise Firewalls in Encrypted Environments |
June 2012 |
64KB |
Aug 06 |
| |
|
|
|
| Operating Systems |
Last Reviewed |
File Size |
Revised |
| Guide to Secure Configuration of Red Hat Enterprise Linux 5 |
Feb 11 |
1.12MB |
Feb 11 |
| Hardening Tips for MAC OS X 10.6 Snow Leopard |
June 2012 |
544K |
Oct 2010 |
| Guide to the Secure Configuration of Red Hat Enterprise Linux 5 |
Sep 10 |
1.60MB |
14 Sep 10 |
| Guide to the Secure Configuration of Red Hat Enterprise Linux 5 |
Mar 09 |
996KB |
19 Nov 07 |
| Guide to Secure Configuration of Solaris 8 |
Mar 09 |
558KB |
21 Jul 04 |
| Supporting Documents |
Last Reviewed |
File Size |
Revised |
| Cloud Computing Guidance |
June 2012 |
118KB |
July 1 |
| VMware ESX Server 3 Configuration Guide |
June 2012 |
608KB |
Mar 08 |
| Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF |
June 2012 |
1.40MB |
Mar 08 |
| Microsoft® Office Groove® Security Architecture |
June 2012 |
768KB |
Apr 07 |
| How to Secure a Groove Manager Web Site |
June 2012 |
148KB |
|
| Web Application Security Overview |
June 2012 |
2,645KB |
|
| The 60 minute Network Security Guide |
June 2012 |
820KB |
15 May 06 |
| Outlook E-mail Security in the Midst of Malicious Code Attacks |
June 2012 |
412KB |
18 Apr 05 |
| Defense in Depth |
June 2012 |
131KB |
|
| Guide to Sun Microsystems Java Plug-in Security |
June 2012 |
288KB |
01 Apr 04 |
| The Case for Using Layered Defenses to Stop Worms |
June 2012 |
174KB |
|
| E-mail Security in the Wake of Recent Malicious Code Incidents |
Mar 09 |
439KB |
14 Aug 02 |
| Web Servers and Browser Guides |
Last Reviewed |
File Size |
Revised |
| Secure Configuration of the Apache Web Server, Apache Server Version 1.3.3 on Red Hat Linux 5.1 |
Mar 09 |
447KB |
10 Nov 03 |
| Guide to the Secure Configuration and Administration of iPlanet Web Server, Enterprise Edition 4.1 |
Mar 09 |
425KB |
10 Nov 03 |
| Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 |
Mar 09 |
696KB |
10 Nov 03 |
| Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 (Checklist Format) |
Mar 09 |
547KB |
10 Nov 03 |
| Guide to Securing Netscape 7.02 |
Mar 09 |
346KB |
24 Jun 03 |
| Windows NT Guides |
Last Reviewed |
File Size |
Revised |
| Zipped Windows NT Security Configuration Guides |
Mar 09 |
1,285KB |
08 Jan 06 |
| Windows 2000 Guides |
Last Reviewed |
File Size |
Revised |
| SCERegVl.INF |
Mar 09 |
13KB |
5 Mar 03 |
| W2kDC.INF |
Mar 09 |
32KB |
5 Mar 03 |
| W2K DOMAIN POLICY.INF |
Mar 09 |
4KB |
|
| W2k Server.INF |
Mar 09 |
32KB |
5 Mar 03 |
| W2k Workstation.INF |
Mar 09 |
31KB |
5 Mar 03 |
| ISA.INF |
Mar 09 |
1KB |
|
| Microsoft Windows 2000 Network Architecture Guide |
Mar 09 |
227KB |
|
| Guide to Securing Microsoft Windows 2000 Group Policy |
Mar 09 |
328KB |
|
| Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set 1.2.2 |
Mar 09 |
755KB |
12 Sep 06 |
| Group Policy Reference |
Mar 09 |
769KB |
|
| Guide to Securing Microsoft Windows 2000 Active Directory |
Mar 09 |
611KB |
|
| Guide to Securing Microsoft Windows 2000 DNS |
Mar 09 |
372KB |
|
| Guide to Securing Microsoft Windows 2000 Encrypting File System |
Mar 09 |
218KB |
|
| Guide to Securing Microsoft Windows 2000 File and Disk Resources |
Mar 09 |
420KB |
|
| Guide to Securing Microsoft Windows 2000 Schema |
Mar 09 |
133KB |
|
| Guide to Securing Microsoft Windows NT/9x Clients in a Windows 2000 Network |
Mar 09 |
231KB |
|
| Guide to Secure Configuration and Administration of Microsoft ISA Server 2000 |
Mar 09 |
1,469KB |
|
| Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services |
Mar 09 |
1,432KB |
|
| Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services (Checklist Format) |
Mar 09 |
1,167KB |
|
| Guide to Secure Configuration and Administration of Microsoft Internet Information Services 5.0 version 1.4 |
Mar 09 |
2,731KB |
16 JAN 04 |
| Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 |
Mar 09 |
800KB |
|
| Guide to Windows 2000 Kerberos Settings |
Mar 09 |
369KB |
|
| Microsoft Windows 2000 Router Configuration Guide |
Mar 09 |
688KB |
|
| Guide to Securing Microsoft Windows 2000 DHCP |
Mar 09 |
337KB |
|
| Guide to Securing Microsoft Windows 2000 Terminal Services |
Mar 09 |
662KB |
|
| Microsoft Windows 2000 IPsec Guide |
Mar 09 |
1,330KB |
|
| Guide to Secure Configuration and Administration of Microsoft Exchange 2000 |
Mar 09 |
4,200KB |
15 Dec 04 |
| Zipped Windows 2000 Security Configuration Guides** (zip file) |
Mar 09 |
16,300KB |
28 Oct 05 |
| Apple Mac OS X 10.5 'Leopard' Guides |
Last Reviewed |
File Size |
Revised |
| Mac OS X Security Configuration for Version 10.5 Leopard Second Edition |
Mar 09 |
3.5MB |
|
| Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" |
Mar 09 |
304KB |
Sep 08 |
| Apple Mac OS X 10.4 'Tiger' Guides |
Last Reviewed |
File Size |
Revised |
| Mac OS X Security Configuration For Version 10.4 or Later, Second Edition |
Mar 09 |
2.98MB |
|
| Mac OS X Server Security Configuration For Version 10.4 or Later, Second Edition |
Mar 09 |
5.98MB |
|
| Apple Mac OS X 10.3 'Panther' Guides |
Last Reviewed |
File Size |
Revised |
| Apple Mac OS X v10.3.x "Panther" Security Configuration Guide |
Mar 09 |
2533KB |
|
| Apple Mac OS X Server v10.3.x "Panther" Security Configuration Guide |
Mar 09 |
876KB |
|
| Web Server and Browser Guides |
Last Reviewed |
File Size |
Revised |
| Guide to Secure Configuration and Administration of Microsoft Internet Information Services 5.0 version 1.4 |
Mar 09 |
2,731KB |
16 Jan 04 |
| Guide to Securing Microsoft Internet Explorer 5.5 Using Group Policy |
Mar 09 |
147KB |
|
| VoIP and IP Telephony |
Last Reviewed |
File Size |
Revised |
| Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3 |
June 2012 |
86KB |
Apr 10 |
| Activating Authentication and Encryption for Cisco CallManager 4.(x) |
June 2012 |
919KB |
Apr 08 |
| Security Guidance for Deploying IP Telephony Systems |
June 2012 |
872KB |
14 Feb 06 |
| Recommended IP Telephony Architecture |
June 2012 |
232KB |
01 May 06 |
| Vulnerability Technical Reports |
Last Reviewed |
File Size |
Revised |
| Best Practices for Storage Networks |
June 2012 |
605KB |
18 Oct 07 |
| Redacting with Confidence: How to Safely Publish Sanitized Reports Converted from Word to PDF |
June 2012 |
1.38MB |
18 Mar 08 |
| Wireless Guides |
Last Reviewed |
File Size |
Revised |
| Guidelines for the Development and Evaluation of IEEE 802.11 Intrusion Detection Systems (IDS) |
June 2012 |
527KB |
01 Nov 05 |
| System Level IA Guidance |
Last Reviewed |
File Size |
Revised |
| SSE-100-1, National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System |
14 Dec 05 |
2,287KB |
14 Dec 05 |
| Guidance for Addressing Malicious Code Risk |
10 Sep 07 |
296KB |
10 Sep 07 |
| Trusted Computing |
Last Reviewed |
File Size |
Revised |
| Host and Network Integrity Through Trusted Computing |
- |
- |
- |
| |
|
|
|
| |
|
|
|