Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Archived Security Configuration Guides

NSA has developed and maintained configuration guidance for a number of products. Over time these products age, are superceded by newer versions, or are no longer used. As such, NSA may choose to discontinue maintenance and archive some of these guides.

Application Guides Last Reviewed File Size Revised
Guide to Secure Configuration and Administration of Microsoft Exchange 5.x Mar 09 748KB 10 Nov 03
Microsoft Office 97 Executable Content Security Risk and Countermeasures Mar 09 284KB 10 Nov 03
Guide to Using DoD PKI Certificates in Outlook 2000 Mar 09 114KB 09 Jun 05
Oerating Systems Last Reviewed File Size Revised
Guide to Secure Configuration of Solaris 8 Mar 09 558KB 21 Jul 04
Supporting Documents Last Reviewed File Size Revised
E-mail Security in the Wake of Recent Malicious Code Incidents Mar 09 439KB 14 Aug 02
Web Servers and Browser Guides Last Reviewed File Size Revised
Secure Configuration of the Apache Web Server, Apache Server Version 1.3.3 on Red Hat Linux 5.1 Mar 09 447KB 10 Nov 03
Guide to the Secure Configuration and Administration of iPlanet Web Server, Enterprise Edition 4.1 Mar 09 425KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 Mar 09 696KB 10 Nov 03
Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0 (Checklist Format) Mar 09 547KB 10 Nov 03
Guide to Securing Netscape 7.02 Mar 09 346KB 24 Jun 03
Windows NT Guides Last Reviewed File Size Revised
Zipped Windows NT Security Configuration Guides Mar 09 1,285KB 08 Jan 06

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Apr 23, 2009 | Last Reviewed: Apr 23, 2009

 
bottom

National Security Agency / Central Security Service