Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Supporting Documents

NSA has developed and distributed configuration guidance for a wide variety of software. These supporting documents are intended to extend configuration guidance beyond security applications and Operating Systems with the intention of providing security guidance across an entire network.

Title Last Reviewed File Size Revised
VMware ESX Server 3 Configuration Guide Mar 09 608KB Mar 08
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF Mar 09 1.40MB Mar 08
Microsoft® Office Groove® Security Architecture Mar 09 768KB Apr 07
How to Secure a Groove Manager Web Site Mar 09 148KB
Web Application Security Overview Mar 09 2,645KB
The 60 minute Network Security Guide Mar 09 820KB 15 May 06
Outlook E-mail Security in the Midst of Malicious Code Attacks Mar 09 412KB 18 Apr 05
Defense in Depth Mar 09 131KB  
Guide to Sun Microsystems Java Plug-in Security Mar 09 288KB 01 Apr 04
The Case for Using Layered Defenses to Stop Worms Mar 09 174KB  
Zipped Supporting Documents Security Configuration Guide** (zip file) Mar 09 4,283KB 13 Sep 07

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Mar 30, 2009 | Last Reviewed: Mar 30, 2009

 
bottom

National Security Agency / Central Security Service