The NSA Information Assurance Directorate collaborates with application software vendors and the security community to develop security guidance. This guidance may be issued by IAD or by the vendor. IAD recommends using the latest version of any application, as these...
15 May 2015
This document provides an overview of Application Whitelisting, including what it is, why one should use it, and how to enforce it.
01 August 2010 2 page(s) pdf
Application Whitelisting Using Microsoft AppLocker
This guide describes Microsoft AppLocker settings recommended by the NSA’s Information Assurance Directorate (IAD) for deploying location-based application whitelisting on your network. Alternative application whitelisting implementations that may support your organizational needs are commercially available. These alternative implementations may provide...
01 August 2014 51 page(s) pdf
Bluetooth for Unclassified Use: Guidelines for Developers
Bluetooth offers the convenience of low-power wireless device-to-device communication, opening the door for diverse and exciting use cases for recreational and business users. The proliferation of Bluetooth into a broad range of modern personal devices has generated a demand for...
04 August 2016 13 page(s) pdf
Application Whitelisting is a proactive security technique that only allows a limited set of approved programs to run, while blocking all other programs (including most malware) from running by default.
31 October 2013 2 page(s) pdf
Apple® Quicktime® Reaches End-of-Life for Windows® Factsheet
Apple® has officially ended support for QuickTime® on Microsoft Windows®. In January of 2016, Apple® released the final update of QuickTime® for Windows® and removed the QuickTime® plugin from browsers to help mitigate future vulnerabilities. In April of 2016, two...
09 May 2016 pdf
Host Mitigation Package (HMP)
Host Mitigations Package (HMP) is designed to aid organizations and system administrators in hardening their host systems.
01 December 2013 4 page(s) pdf
A Guide to Border Gateway Protocol (BGP) Best Practices
The dominant routing protocol on the Internet is the Border Gateway Protocol (BGP). BGP has been deployed since the commercialization of the Internet and version 4 of BGP is over a decade old. BGP works well in practice, and its...
17 September 2018 17 page(s) pdf
Application Whitelisting Best Practices
Cyber defense is not easy. Application Whitelisting is the number one mitigation from the NSA's Information Assurance Top 10, yet many network owners find it a challenge to implement. Learn about some of the common barriers to implementing Application Whitelisting...
18 November 2016 13 page(s) pdf
Spotting the Adversary with Windows Event Log Monitoring (version 2)
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event...
07 August 2015 54 page(s) pdf
Guidelines for Application Whitelisting Industrial Control Systems
This document serves as an appendix to the “Seven Steps to Defend Industrial Control Systems” document, providing additional conceptual-level guidance on implementing application whitelisting.
Application Whitelisting (AWL) can detect and prevent attempted execution of malware uploaded by adversaries. The static...
01 April 2016 7 page(s) pdf
IAD's Top 10 Information Assurance Mitigation Strategies
Fundamental aspects of network security involve protection, detection and response measures. This provides guidance for organizations to secure and manage networks thus making the networks defensible and recommends proactive mitigation advise to counter cyber threats.
18 February 2016 2 page(s) pdf
Ransomware: Locky (version 2)
Malware placemats summarize a particular piece of malware based on researched, collected and fused information and analysis. Placemats are intended to inform customers of the past, present, and potential future infections, characteristics, and best practices/mitigations on particular pieces of malware....
11 April 2016 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-14 of 14 results returned for: "keywords:"Application""