Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA News IA Events Open for Registration Closed for Registration Scheduled IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Current Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Archived Security Configuration Guides

NSA has developed and maintained configuration guidance for a number of products. Over time these products age, are superceded by newer versions, or are no longer used. As such, NSA may choose to discontinue maintenance and archive some of these guides.

Application Guides File Size Archived
Guide to Secure Configuration and Administration of Microsoft Exchange 5.x 748KB 10 Nov 03
Microsoft Office 97 Executable Content Security Risk and Countermeasures 284KB 10 Nov 03
Guide to Using DoD PKI Certificates in Outlook 2000 114KB 09 Jun 05
Supporting Documents File Size Archived
E-mail Security in the Wake of Recent Malicious Code Incidents 439KB 14 Aug 02
Web Servers and Browser Guides File Size Archived
Secure Configuration of the Apache Web Server, Apache Server Version 1.3.3 on Red Hat Linux 5.1 447KB 10 Nov 03
Guide to the Secure Configuration and Administration of iPlanet Web Server, Enterprise Edition 4.1 425KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 696KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 (Checklist Format) 547KB 10 Nov 03
Windows NT Guides File Size Archived
Zipped Windows NT Security Configuration Guides 1,285KB 08 Jan 06

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service