Information Assurance Menu

.
Skip Search Box

Archived Security Configuration Guides

NSA has developed and maintained configuration guidance for a number of products. Over time these products age, are superceded by newer versions, or are no longer used. As such, NSA may choose to discontinue maintenance and archive some of these guides.

Application Guides Last Reviewed File Size Revised
Hidden Data and Metadata in Adobe PDF Files Jun 2012 1,210KB Jul 2008
Oracle Application Server Security Recommendations and DoDI 8500.2 IA Controls Jun 2012 294KB Dec 2006
Oracle Application Server on Windows 2003 Security Guide Jun 2012 332KB Dec 2006
Systems Management Server 2003 Security Guide Jun 2012 1,657KB Apr 2005
BEA WebLogic Platform Security Guide Jun 2012 840 KB Apr 2005
Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Guide Jun 2012 589KB Feb 2005
Guide to Secure Configuration and Administration of Microsoft Exchange 2000 Jun 2012 4,200KB Dec 2004
Microsoft Office 2000 Executable Content Security Risk and Countermeasures Jun 2012 806KB  
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 Jun 2012 800KB  
Guide to Microsoft .NET Framework Security Mar 2009 1,995kb Nov 2006
Guide to Using DoD PKI Certificates in Outlook 2000 Mar 2009 114KB 09 Jun 2005
Fact Sheets Last Reviewed File Size Revised
Securing IBM Lotus Sametime Jun 2012 337KB Jan 2011
Cisco Unified Presence Server (CUPS) Fact Sheet Jun 2012 555KB Nov 2010
Application Whitelisting Trifold Jun 2012 751KB Aug 2010
Encrypting Files with SecureZip Jun 2012 470KB Jan 2011
Social Networking Sites Jun 2012 256KB Dec 2009
Exchanging Files with PGP Jun 2012 294KB Dec 2009
Windows Fine-Grained Password Policies Jun 2012 61KB May 2009
Mitigation Monday #2: Defense Against Drive-By Downloads Jun 2012 107KB Jun 2009
Encrypting Files with WinZip® Jun 2012 624KB Jul 2009
Securing Fibre Channel Storage Area Networks Jun 2012 3.32MB Mar 2009
Service Oriented Architecture Security Vulnerabilities - Web Services Jun 2012 213KB Nov 08
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" Jun 2012 304KB Sep 2008
Minimize the Effectiveness of SQL Injection Attacks Jun 2012 128KB May 2008
802.11 Wireless LAN Intrusion Detection Systems Jun 2012 160KB May 08
Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 Jun 2012 364KB May 2008
Video Teleconferencing (VTC) Jun 2012 748KB Mar 2008
Disabling USB Storage Drives Jun 2012 816KB Mar 2008
The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 Jun 2012 65 KB Feb 2008
A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) Jun 2012 225 KB Feb 2008
Internet Protocol version 6 Factsheet Jun 2012 82KB Jan 2008
Port Security on Cisco Access Switches Factsheet Jun 2012 82KB Jan 2008
Bluetooth Security Jun 2012 856KB Dec 2007
Hardening Tips for the Red Hat Enterprise Linux 5 Jun 2012 239KB Nov 2007
Data Execution Prevention (DEP) Jun 2012 170KB Oct 2007
How to Securely Configure Microsoft Windows Vista BitLocker Jun 2012 1,049KB Aug 2007
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console Jun 2012 233KB May 2007
Configuring a Cisco Router for Remote Administration Using the Router Console Jun 2012 245KB May 2007
Biometrics Security Considerations Jun 2012 282KB Apr 2007
Secure Instant Messaging Jun 2012 224KB Feb 2007
Security Guidance for Using Mail Clients Jun 2012 247KB Feb 2007
Enterprise Firewall Types Jun 2012 108KB Aug 2006
Desktop or Enterprise Firewall? Jun 2012 72KB Aug 2006
Enterprise Firewalls in Encrypted Environments Jun 2012 64KB Aug 2006
Operating Systems Last Reviewed File Size Revised
NSA Windows XP Security Guide Addendum
Jun 2012 50 KB Sep 2012
Guide to Secure Configuration of Red Hat Enterprise Linux 5 Feb 2011 1.12MB Aug 2011
Hardening Tips for MAC OS X 10.6 Snow Leopard Jun 2012 544K Oct 2010
Hardening Tips for Red Had Enterprise Linux 5 Jun 2012 239KB Nov 2007
Router Guides Last Reviewed File Size Revised
Router Security Configuration Guide Supplement - Security for IPv6 Routers, Version 1.0 Jun 2012 2,681KB May 2006
Router Security Configuration Guide, Executive Summary Jun 2012 161KB Feb 2003
Router Security Configuration Guide, Version 1.1c Jun 2012 3,042KB Dec 2005
Supporting Documents Last Reviewed File Size Revised
Cloud Computing Guidance Jun 2012 118KB Jul 2011
VMware ESX Server 3 Configuration Guide Jun 2012 608KB Mar 2008
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF Jun 2012 1.40MB Mar 2008
Microsoft® Office Groove® Security Architecture Jun 2012 768KB Apr 007
How to Secure a Groove Manager Web Site Jun 2012 148KB -
Web Application Security Overview Jun 2012 2,645KB -
The 60 minute Network Security Guide Jun 2012 820KB May 006
Outlook E-mail Security in the Midst of Malicious Code Attacks Jun 2012 412KB Apr 2005
Defense in Depth Jun 2012 131KB -
Guide to Sun Microsystems Java Plug-in Security Jun 2012 288KB Apr 2004
The Case for Using Layered Defenses to Stop Worms Jun 2012 174KB -
Windows 2000 Guides Last Reviewed File Size Revised
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0 Mar 2009 800KB  
Guide to Secure Configuration and Administration of Microsoft Exchange 2000 Mar 2009 4,200KB Dec 2004
Apple Mac OS X 10.5 'Leopard' Guides Last Reviewed File Size Revised
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" Mar 2009 304KB Sep 08
VoIP and IP Telephony Last Reviewed File Size Revised
Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3 Jun 2012 86KB Apr 2010
Activating Authentication and Encryption for Cisco CallManager 4.(x) Jun 2012 919KB Apr 08
Security Guidance for Deploying IP Telephony Systems Jun 2012 872KB Feb 2006
Recommended IP Telephony Architecture Jun 2012 232KB May 2006
Vulnerability Technical Reports Last Reviewed File Size Revised
Best Practices for Storage Networks Jun 2012 605KB Oct 2007
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted from Word to PDF Jun 2012 1.38MB Mar 08
Wireless Guides Last Reviewed File Size Revised
Guidelines for the Development and Evaluation of IEEE 802.11 Intrusion Detection Systems (IDS) Jun 2012 527KB Nov 2005
System Level IA Guidance Last Reviewed File Size Revised
SSE-100-1, National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System Dec 2005 2,287KB Dec 2005
Guidance for Addressing Malicious Code Risk Sep 2007 296KB Sep 2007
Trusted Computing Last Reviewed File Size Revised
Host and Network Integrity Through Trusted Computing - - -

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Apr 18, 2014 | Last Reviewed: Apr 18, 2014

 
bottom