Operating Systems
The NSA Information Assurance Directorate (IAD) collaborates with operating system vendors and the security community to develop consensus-based security guidance. This guidance may be issued by IAD or by the vendor. IAD recommends using the latest version of any operating system, as these implement security features which protect against modern attacks.
-
From section:
Operating Systems
Implementing a Secure Administrator Workstation Using Device Guard
Defenders must raise the cost for an adversary to obtain high-value domain credentials after an initial intrusion. One such way is through a dedicated administrator workstation for performing highly-privileged tasks subsequently referred to as a Secure Administrator Workstation (SAW). SAWs address credential theft techniques by limiting highly-privileged credentials to specific hardened systems. This guide will help DoD administrators configure a...
27 July 2016 8 page(s) pdf
-
From section:
Operating Systems
Security Highlights of Windows 10
This document provides a high-level description of new security features in Windows 10 for senior technology leaders. It describes how these features disrupt attacker tools, techniques, and procedures used against National Security Systems today.
24 February 2016 2 page(s) pdf
-
From section:
Operating Systems
Microsoft's Enhanced Mitigation Experience Toolkit: A Rationale for Enabling Modern Anti-Exploritation Mitigations in Windows
Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigations that prevent the successful exploitation of memory corruption vulnerabilities in software, including many zero-day and bu er over ow attacks.
01 October 2014 12 page(s) pdf
-
From section:
Operating Systems
Understanding the Enhanced Mitigation Experience Toolkit Frequently Asked Questions
This document contains Frequently Asked Questions regarding EMET
01 October 2014 8 page(s) pdf
-
From section:
Operating Systems
Microsoft's Enhanced Mitigation Experience Toolkit: A Rationale for Enabling Modern Anti-Exploritation Mitigations in Windows
Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigations that prevent the successful exploitation of memory corruption vulnerabilities in software, including many zero-day and bu er over ow attacks.
01 October 2014 12 page(s) pdf
-
From section:
Operating Systems
SCAP Content for Apple iOS 5 Security Configuration Recommendations
These are zip files that go with the Apple iOS configuration guide
01 May 2012 zip
-
From section:
Operating Systems
Security Configuration Recommendations for Apple iOS 5 Devices (version 0)
This document provides security-related usage and configuration recommendations for Apple iOS devices such as the iPhone, iPad, and iPod touch.
28 March 2012 37 page(s) pdf
-
From section:
Operating Systems
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 (version 4.2)
The purpose of this guide is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in...
26 August 2011 200 page(s) pdf
-
From section:
Operating Systems
Security Highlights of Windows 7
This guide highlights many of the new security features in Windows 7, just one of the many commercial operating systems available.
06 October 2010 2 page(s) pdf
-
From section:
Operating Systems
Application Whitelisting using Software Restriction Policies (version 1.1)
Software Restriction Policies (SRP) enables administrators to control which applications are allowed to run on Microsoft Windows. SRP is a feature of Windows XP and later operating systems. It can be configured as a local computer policy or as domain policy using Group Policy with Windows Server 2003 domains and later. Using this guide, administrators can configure SRP to prevent...
01 August 2010 19 page(s) pdf
Top