Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education Colloquium Institutions SEAL Program IA Courseware Evaluation Program Institutions Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

Supporting Documents

NSA has developed and distributed configuration guidance for a wide variety of software. These supporting documents are intended to extend configuration guidance beyond security applications and Operating Systems with the intention of providing security guidance across an entire network.

Title Last Reviewed File Size Revised
Guidelines for Implementation of REST June 2012 276KB March 11
Cloud Computing Guidance June 2012 118KB July 1
VMware ESX Server 3 Configuration Guide June 2012 608KB Mar 08
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF June 2012 1.40MB Mar 08
Microsoft® Office Groove® Security Architecture June 2012 768KB Apr 07
How to Secure a Groove Manager Web Site June 2012 148KB
Web Application Security Overview June 2012 2,645KB
The 60 minute Network Security Guide June 2012 820KB 15 May 06
Outlook E-mail Security in the Midst of Malicious Code Attacks June 2012 412KB 18 Apr 05
Defense in Depth June 2012 131KB  
Guide to Sun Microsystems Java Plug-in Security June 2012 288KB 01 Apr 04
The Case for Using Layered Defenses to Stop Worms June 2012 174KB  
Zipped Supporting Documents Security Configuration Guide** (zip file) June 2012 4,283KB 13 Sep 07

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: June 22, 2012 | Last Reviewed: June 22, 2012

 
bottom

National Security Agency / Central Security Service