Security Content Automation Protocol (SCAP)

SCAP is a method for using specific standards to enable the automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., FISMA compliance. The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. This page shows you the list of SCAPs that are actively tracked by this website. These SCAPs will be updated on at least a quarterly basis, dependant upon the releases DISA makes.

Title Version / Release Published Description
Adobe Acrobat Reader DC Classic Track Security Technical Implementation Guide
  • 2019-07-26
  • 2018-10-26
  • 2018-06-11
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Adobe Acrobat Reader DC Classic Track Security Technical Implementation Guide
  • 2016-03-08
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
  • 2019-07-26
  • 2018-10-26
  • 2018-06-12
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
  • 2016-03-08
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
AIX 5.3 Security Technical Implementation Guide
  • 2013-11-04
The AIX Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE
  • 2016-07-22
  • 2015-12-02
  • 2015-09-11
  • 2013-09-23
The AIX Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]
Google Chrome Current Windows Security Technical Implementation Guide
  • 2019-07-26
  • 2019-01-25
  • 2018-11-09
  • 2018-10-26
  • 2018-07-27
The Google Chrome Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Google Chrome v23 Windows STIG
  • 2013-07-05
  • 2013-01-11
Google Chrome v24 Windows Benchmark
  • 2013-03-07
HP-UX 11.23 Security Technical Implementation Guide
  • 2015-12-02
  • 2015-09-11
The HP-UX 11.23 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
HP-UX 11.31 Security Technical Implementation Guide
  • 2018-10-26
  • 2018-07-27
The HP-UX 11.31 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
HP-UX 11.31 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-12-02
  • 2015-09-11
  • 2013-10-17
The HP-UX 11.31 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Internet Explorer 8 STIG
  • 2014-09-30
The Internet Explorer 8 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Browser products may observe alternate registry paths for stored configuration values.
Internet Explorer 8 STIG
  • 2014-01-08
The Internet Explorer 8 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Browser products may observe alternate registry paths for stored configuration values.
Internet Explorer 9 Security Technical Implementation Guide
  • 2014-09-30
  • 2014-01-08
The Internet Explorer 9 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
McAfee VirusScan 8.8 Local Client STIG
  • 2019-01-11
The McAfee VirusScan 8.8 Local Client STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
McAfee VirusScan 8.8 Managed Client STIG
  • 2019-04-26
The McAfee VirusScan Managed Client STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Access 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Access 2013 STIG
  • 2015-04-13
The Microsoft Access 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Dot Net Framework 4.0 STIG
  • 2016-03-11
  • 2015-09-15
  • 2013-03-06
Applicable to systems and applications utilizing the Microsoft .Net version 4.0 framework.
Microsoft DotNet Framework 4.0 STIG
  • 2018-10-26
Applicable to systems and applications utilizing the Microsoft .Net version 4.0 framework.
Microsoft Excel 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Excel 2013 STIG
  • 2015-07-24
The Microsoft Excel 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Groove 2013 STIG
  • 2015-04-13
The Microsoft Groove 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft InfoPath 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft InfoPath 2013 STIG
  • 2015-07-24
The Microsoft InfoPath 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Internet Explorer 10 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-12-16
  • 2015-09-14
  • 2014-09-30
  • 2014-01-08
The Microsoft Internet Explorer 10 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Internet Explorer 11 Security Technical Implementation Guide
  • 2019-04-26
  • 2018-07-27
The Microsoft Internet Explorer 11 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Internet Explorer 11 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-12-09
The Microsoft Internet Explorer 11 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Internet Explorer 11 Security Technical Implementation Guide
  • 2015-12-30
The Microsoft Internet Explorer 11 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Lync 2013 STIG
  • 2015-04-13
The Microsoft Lync 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Office System 2010
  • 2015-04-16
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Office System 2013 STIG
  • 2018-10-26
  • 2018-04-27
The Microsoft Office System 2013 STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Office System 2013 STIG
  • 2015-07-24
The Microsoft Office System 2013 STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Office System 2016 Security Technical Implementation Guide
  • 2018-10-26
  • 2018-02-14
The Microsoft Office System 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft OneNote 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft OneNote 2013 STIG
  • 2015-04-13
The Microsoft OneNote 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Outlook 2010
  • 2015-09-18
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values.
Microsoft Outlook 2013 STIG
  • 2018-10-26
The Microsoft Outlook 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Outlook 2013 STIG
  • 2016-07-22
  • 2015-12-10
  • 2015-07-24
The Microsoft Outlook 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft PowerPoint 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft PowerPoint 2013 STIG
  • 2015-04-13
The Microsoft PowerPoint 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Project 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Project 2013 STIG
  • 2016-04-22
  • 2015-04-13
The Microsoft Project 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Publisher 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Publisher 2013 STIG
  • 2015-07-24
The Microsoft Publisher 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Publisher 2016 Security Technical Implementation Guide
  • 2018-04-27
The Microsoft Publisher 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft SharePoint Designer 2013 STIG
  • 2015-04-13
The Microsoft SharePointDesigner 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Visio 2013 STIG
  • 2015-04-13
The Microsoft Visio 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Word 2010
  • 2015-04-16
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Microsoft Word 2013 STIG
  • 2015-04-13
The Microsoft Word 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Mozilla FireFox Security Technical Implementation Guide
  • 2019-07-26
The Mozilla FireFox Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Mozilla FireFox Security Technical Implementation Guide
  • 2019-07-26
The Mozilla FireFox Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
MS Windows Defender Antivirus Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-04-27
The Windows Defender Antivirus Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be send via e-mail to the following address: [email protected]
Red Hat Enterprise Linux 5 Security Technical Implementation Guide
  • 2017-10-27
  • 2016-07-22
  • 2015-12-03
  • 2015-09-03
  • 2014-04-03
The Red Hat Enterprise Linux 5 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Red Hat Enterprise Linux 6 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2019-01-25
  • 2018-10-26
  • 2018-07-27
The Red Hat Enterprise Linux 6 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Red Hat Enterprise Linux 6 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-12-03
  • 2015-09-09
  • 2015-03-06
The Red Hat Enterprise Linux 6 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2019-01-25
  • 2018-07-31
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]
Solaris 10 SPARC Security Technical Implementation Guide
  • 2019-07-26
  • 2019-01-25
  • 2018-01-26
The Solaris 10 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
SOLARIS 10 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE
  • 2016-06-22
  • 2015-12-07
  • 2015-09-04
The Solaris 10 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Solaris 10 X86 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-01-25
  • 2018-07-27
The Solaris 10 (X86) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE
  • 2016-06-22
  • 2015-12-07
  • 2015-09-17
The Solaris 10 (X86) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Solaris 11 SPARC Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-10-26
  • 2018-07-27
Developed by Oracle in coordination with DISA for the DoD. The Solaris 11 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Solaris 11 SPARC Security Technical Implementation Guide
  • 2016-07-22
  • 2015-08-24
Developed by Oracle in coordination with DISA for the DoD. The Solaris 11 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Solaris 11 X86 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-10-26
  • 2018-06-20
Developed by Oracle in coordination with DISA for the DoD. The Solaris 11 (X86) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Solaris 11 X86 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-08-24
Developed by Oracle in coordination with DISA for the DoD. The Solaris 11 (X86) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
SOLARIS 9 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE
  • 2015-09-15
  • 2013-04-10
The Solaris 9 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
SUSE Linux Enterprise Server v11 for System z
  • 2015-10-20
  • 2015-05-27
The SUSE Linux Enterprise Server Ver 11 for System z Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
SUSE Linux Enterprise Server v11 for System z
  • 2013-04-18
The SUSE Linux Enterprise Server Ver 11 for System z Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Traditional Security
  • 2013-07-11
Previously the Traditional Security Checklist, consisted of five (5) component sub-checklists that were selected for use based upon the type of review being conducted. The new Traditional Security Checklist consolidates all checks into one document and is more granular both in the increased number of checks (151 total versus 96 total in the old checklists) and the details about how to conduct them. It provides a more complete and current list of references, the relationship and authority for checks relative to protection of Defense Information System Network (DISN) assets, and will enhance reviewer consistency with application of potential findings. While the number of potential findings have increased and are more focused to a specific check there is additional granularity within each check. In many of the primary checks there are additional considerations and "sub-checks". As the new checklist is further developed it may be that some of these sub-checks will become additional stand-alone primary checks. The format and content flow of the new checklist is like other Security Technical Implementation Guide (STIG) checklists derived from the Vulnerability Management System (VMS) database, which is used by DISA FSO, the Combatant Commands, Services, and Agencies (CC/S/A) and other Federal Agencies with access to the Defense Information Systems Network (DISN) to document and follow-up findings noted during Command Cyber Readiness Inspections (CCRIs). Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
USGCB: Guidance for Securing Microsoft Windows 7 energy settings for IT Professionals
  • 2011-06-10
This guide has been created to assist IT professionals, in effectively configuring energy conserving settings on systems with Microsoft Windows 7
Win2k3 Audit
  • 2013-06-10
The Windows 2003 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus, as well as the Windows 2003 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Win2k8 Audit
  • 2013-06-10
The Windows 2008 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 2008 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Win2k8 R2 Audit
  • 2013-06-10
The Windows Server 2008 R2 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Server 2008 R2 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Win7 Audit
  • 2013-06-10
The Windows 7 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 7 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 10 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-05-24
  • 2018-11-15
  • 2018-07-27
The Windows 10 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 10 Security Technical Implementation Guide
  • 2016-06-08
  • 2016-01-07
The Windows 10 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2003 Domain Controller Security Technical Implementation Guide
  • 2015-06-23
  • 2014-12-13
  • 2014-10-19
  • 2014-07-09
The Windows 2003 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus, as well as the Windows 2003 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2003 Member Server Security Technical Implementation Guide
  • 2015-06-24
  • 2014-12-13
  • 2014-10-19
  • 2014-07-09
The Windows 2003 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus, as well as the Windows 2003 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2008 Domain Controller Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-07-27
The Windows 2008 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 2008 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2008 Domain Controller Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2015-01-06
  • 2014-10-19
  • 2014-07-03
The Windows 2008 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 2008 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2008 Member Server Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-07-27
The Windows 2008 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 2008 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 2008 Member Server Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2014-12-13
  • 2014-10-19
  • 2013-12-18
The Windows 2008 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 2008 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 7 Security Technical Implementation Guide
  • 2018-04-27
The Windows 7 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 7 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 7 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2015-03-09
  • 2014-12-13
  • 2014-10-19
  • 2014-07-03
The Windows 7 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 7 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 8 / 8.1 Security Technical Implementation Guide
  • 2016-07-22
  • 2015-11-30
  • 2015-09-02
  • 2014-12-13
  • 2014-10-22
  • 2014-07-03
The Windows 8 / 8.1 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows 8/8.1 Security Technical Implementation Guide
  • 2018-04-27
The Windows 8/8.1 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Firewall with Advanced Security Security Technical Implementation Guide
  • 2018-07-27
The Windows Firewall with Advanced Security Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Firewall with Advanced Security Security Technical Implementation Guide
  • 2016-07-22
  • 2015-06-26
  • 2014-09-19
The Windows Firewall with Advanced Security Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-10-26
  • 2018-07-27
The Windows Server 2008 R2 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Server 2008 R2 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2015-01-06
  • 2014-10-19
  • 2013-12-18
The Windows Server 2008 R2 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Server 2008 R2 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2008 R2 Member Server Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-10-26
  • 2018-07-27
The Windows Server 2008 R2 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Server 2008 R2 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2008 R2 Member Server Security Technical Implementation Guide
  • 2016-07-22
  • 2016-01-22
  • 2015-09-02
  • 2015-03-09
  • 2014-12-13
  • 2014-10-19
  • 2014-07-09
The Windows Server 2008 R2 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Server 2008 R2 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2012 / 2012 R2 Domain Controller Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2014-10-19
  • 2014-07-09
  • 2014-04-18
The Windows Server 2012 / 2012 R2 Domain Controller Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2012 / 2012 R2 Member Server Security Technical Implementation Guide
  • 2016-07-22
  • 2015-09-02
  • 2014-10-19
  • 2014-07-09
  • 2014-04-18
The Windows Server 2012 / 2012 R2 Member Server Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2019-01-25
  • 2018-10-26
  • 2018-07-27
The Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2018-10-26
  • 2018-07-27
The Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows Server 2016 Security Technical Implementation Guide
  • 2019-07-26
  • 2019-04-26
  • 2019-01-25
  • 2018-10-26
  • 2018-07-27
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]
Windows Vista Security Technical Implementation Guide
  • 2016-10-28
  • 2016-07-22
  • 2015-09-01
  • 2015-01-05
  • 2014-10-19
  • 2014-07-09
The Windows Vista Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows Vista Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Windows XP Security Technical Implementation Guide
  • 2014-04-07
The Windows XP Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus, as well as the Windows XP Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
z/OS BMC CONTROL-M for ACF2 STIG
  • 2018-09-20
z/OS BMC CONTROL-O for ACF2 STIG
  • 2018-09-20
z/OS BMC IOA for ACF2 STIG
  • 2018-09-20
z/OS VSS for RACF STIG
  • 2013-01-10