Download NSA Security Guides

What is the NSA? What are the NSA Security Guides? Where can I download the NSA Security guides?

I’m not sure you really really want to know what the NSA is, but if you insist – here you go:

The National Security Agency is the U.S.’s cryptologic organization. It coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information. A high technology organization, NSA is on the frontiers of communications and data processing. It is also one of the most important centers of foreign language analysis and research within the Government.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

NSA has developed and distributed configuration guidance for Microsoft Windows NT in the form of NT configuration guides. These guides are currently being used throughout the government and by numerous entities as a security baseline for their NT systems.

To assist our Windows 2000/2003 user community, NSA has developed security configuration guidance for Windows 2000/2003, with the cooperation of the other government agencies and industry partners who provided their expertise and extensive technical review. The configuration guides for Microsoft Windows 2000/2003 are being posted on the NSA web site and are presented in three parts: ".INF" files, configuration guides, and supporting documents.

Besides Windows security guides you can also download and read guides for other operating systems, server applications (such as Exchange), web servers (Apache, IIS) and firewall products.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: