[et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Best Practices” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]
Technical Security Controls
(By Product)
- McAfee VirusScan 8.8 Local Client
- McAfee VirusScan 8.8 Managed Client
- McAfee MOVE 3.6.1 Multi-Platform Client
- McAfee MOVE 3.6.1 Multi-Platform OSS
- McAfee MOVE Agentless 3.6.1 Security Virtual Appliance
- McAfee MOVE Agentless 3.0 Security Virtual Appliance
- McAfee MOVE Agentless 3.0 VSEL 1.9 for SVA
- McAfee VSEL 1.9/2.0 Local Client
- McAfee VSEL 1.9/2.0 Managed Client
- Symantec Endpoint Protection 12.1 Local Client Antivirus
- Symantec Endpoint Protection 12.1 Managed Client Antivirus
- Application Security and Development
- Adobe ColdFusion 11
- Application Server Security Requirements Guide
- Oracle WebLogic Server 12c
- JBoss EAP 6.3
- Tanium 6.5
- Database Security Requirements Guide
- EDB Postgres Advanced Server
- Microsoft SQL Server 2005 Database
- Microsoft SQL Server 2005 Instance
- Microsoft SQL Server 2012 Database
- Microsoft SQL Server 2012 Database Instance
- MS SQL Server 2014 Database
- MS SQL Server 2014 Instance
- Oracle Database 11g Installation
- Oracle Database 11g Instance
- Oracle Database 11.2g
- Oracle Database 12c
- Adobe Acrobat Reader DC Classic Track
- Adobe Acrobat Reader DC Continuous Track
- Active Directory Domain Security Technical Implementation Guide (STIG)
- Active Directory Forest Security Technical Implementation Guide (STIG)
- Email Services Policy
- Exchange 2010 Client Access Server
- Exchange 2010 Edge Transport Server
- Exchange 2010 Hub Transport Server
- Exchange 2010 Mailbox Server
- MS Exchange 2013 Edge Transport Server
- MS Exchange 2013 Mailbox Server
- Google Search Appliance
- Java Runtime Environment (JRE) version 6 STIG for Unix
- Java Runtime Environment (JRE) version 6 STIG for Windows 7
- Java Runtime Environment (JRE) version 7 STIG for Unix
- Java Runtime Environment (JRE) version 7 STIG for Windows 7
- Java Runtime Environment (JRE) Version 8 STIG for Windows
- Mainframe Product Security Requirements Guide
- Microsoft Dot Net Framework 4.0
- Microsoft Access 2007
- Microsoft Excel 2007
- Microsoft InfoPath 2007
- Microsoft Office System 2007
- Microsoft Outlook 2007
- Microsoft PowerPoint 2007
- Microsoft Word 2007
- Microsoft Excel 2010
- Microsoft InfoPath 2010
- Microsoft Office System 2010
- Microsoft Outlook 2010
- Microsoft PowerPoint 2010
- Microsoft Publisher 2010
- Microsoft Publisher 2010
- Microsoft Word 2010
- Microsoft Access 2013
- Microsoft Excel 2013
- Microsoft InfoPath 2013
- Microsoft Office System 2013
- Microsoft Outlook 2013
- Microsoft PowerPoint 2013
- Microsoft Publisher 2013
- Microsoft Visio 2013
- Microsoft Word 2013
- SharePoint 2010 Security Technical Implementation Guide (STIG)
- SharePoint 2013
- Google Chrome Current Windows
- Microsoft Internet Explorer 10
- Microsoft Internet Explorer 11
- Microsoft IE Version 7
- Internet Explorer 8
- Microsoft Internet Explorer 9
- Mozilla Firefox
- Web Server Security Requirements Guide
- APACHE Server 2.0 for Unix
- APACHE SITE 2.0 for Unix
- APACHE SERVER 2.0 for Windows
- APACHE SITE 2.0 for Windows
- APACHE SERVER 2.2 for Unix
- APACHE SITE 2.2 for Unix
- APACHE SERVER 2.2 for Windows
- APACHE SITE 2.2 for Windows
- IIS6 Server
- IIS6 Site
- IIS 7.0 WEB SERVER
- IIS 7.0 WEB SITE
- Oracle HTTP Server 12.1.3
- HPE 3PAR StoreServ 3.2.x
- Keyboard Video and Mouse Switch
- Multifunction Device and Network Printers
- Traditional Security
- Mobile Policy Security Technical Implementation Guide (STIG)
- AirWatch MDM
- BlackBerry Enterprise Service v10.2.x BlackBerry Device Service
- BlackBerry BES 12.5.x MDM
- MDM Server Policy Security Technical Implementation Guide (STIG)
- IBM MaaS360 v2.3.x MDM
- MobileIron Core v9.x MDM
- BlackBerry OS 7.x
- Commercial Mobile Device (CMD) Policy Security Technical Implementation Guide (STIG)
- BlackBerry 10.2.x OS
- LG Android 5.x Interim Security Configuration Guide
- LG Android 6.x
- Microsoft Windows 10 Mobile
- Microsoft Windows Phone 8.1
- Network Device Management Security Requirements Guide
- Router Security Requirements Guide
- Network Devices
- DNS Policy
- Domain Name System (DNS) Security Requirements Guide
- BIND DNS
- CISCO CSS DNS
- Windows DNS
- Microsoft Windows 2008 Server Domain Name System
- Microsoft Windows 2012 Server Domain Name System
- Defense Switched Network (DSN)
- Test and Development Zone B
- Test and Development Zone C
- Test and Development Zone D
- Test and Development Zone A
- Network Infrastructure Policy
- Application Layer Gateway (ALG) Security Requirements Guide (SRG)
- F5 BIG-IP Access Policy Manager 11.x
- F5 BIG-IP Advanced Firewall Manager 11.x
- F5 BIG-IP Application Security Manager 11.x
- F5 BIG-IP Device Management 11.x
- F5 BIG-IP Local Traffic Manager 11.x
- Firewall Security Technical Implementation Guide – Cisco
- Firewall
- IBM DataPower ALG
- IBM DataPower Network Device Management
- SUSE Linux Enterprise Server v11 for System z
- IPSec VPN Gateway
- Palo Alto Networks ALG
- Palo Alto Networks IDPS
- Palo Alto Networks NDM
- Riverbed SteelHead CX v8 ALG
- Riverbed SteelHead CX v8 NDM
- Perimeter L3 Switch
- Perimeter Router Security Technical Implementation Guide Juniper
- Perimeter Router Security Technical Implementation Guide
- Perimeter Router Security Technical Implementation Guide Cisco
- Perimeter Router Security Technical Implementation Guide
- Perimeter L3 Switch Security Technical Implementation Guide – Cisco
- Perimeter Router Security Technical Implementation Guide Juniper
- Perimeter L3 Switch Security Technical Implementation Guide – Cisco
- Perimeter L3 Switch
- Perimeter Router Security Technical Implementation Guide Cisco
- A10 Networks ADC ALG
- A10 Networks ADC NDM
- Arista MLS DCS-7000 Series L2S
- Arista MLS DCS-7000 Series NDM
- Arista MLS DCS-7000 Series RTR
- Layer 2 Switch Security Technical Implementation Guide – Cisco
- Layer 2 Switch
- Layer 2 Switch Security Technical Implementation Guide – Cisco
- Layer 2 Switch
- Infrastructure L3 Switch Secure Technical Implementation Guide – Cisco
- Infrastructure L3 Switch
- Infrastructure Router Security Technical Implementation Guide Cisco
- Infrastructure Router Security Technical Implementation Guide Juniper
- Infrastructure Router Security Technical Implementation Guide
- Remote Access Policy
- Video Services Policy STIG
- Video Teleconference (VTC)
- Voice Video Endpoint Security Requirements Guide
- Voice/Video over Internet Protocol (VVoIP)
- Voice Video Services Policy
- Voice Video Session Management Security Requirements Guide
- Harris SecNet 11 / 54 Security Technical Implementation Guide (STIG)
- WLAN Bridge Security Technical Implementation Guide (STIG)
- WLAN Controller Security Technical Implementation Guide (STIG)
- WLAN Access Point (Enclave-NIPRNet Connected) Security Technical Implementation Guide (STIG)
- WLAN Access Point (Internet Gateway Only Connection) Security Technical Implementation Guide (STIG)
- WMAN Access Point Security Technical Implementation Guide (STIG)
- WMAN Bridge Security Technical Implementation Guide (STIG)
- General Purpose Operating System SRG
- Apple OS X 10.10 (Yosemite) Workstation
- Apple OS X 10.11
- AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE
- z/OS TADz for ACF2
- IBM Hardware Management Console (HMC) STIG Policies
- IBM Hardware Management Console (HMC)
- z/OS TDMF for ACF2
- z/OS ACF2
- z/OS BMC CONTROL-D for ACF2
- z/OS BMC CONTROL-M for ACF2
- z/OS BMC CONTROL-M/Restart for ACF2
- z/OS BMC CONTROL-O for ACF2
- z/OS BMC IOA for ACF2
- z/OS BMC MAINVIEW for z/OS for ACF2
- z/OS CA 1 Tape Management for ACF2
- z/OS CA Auditor for ACF2
- z/OS CA Common Services for ACF2
- z/OS CA MICS for ACF2
- z/OS CA MIM for ACF2
- z/OS CA VTAPE for ACF2
- z/OS Catalog Solutions for ACF2
- z/OS CL/SuperSession for ACF2
- z/OS Compuware Abend-AID for ACF2
- z/OS CSSMTP for ACF2
- z/OS FDR for ACF2
- z/OS HCD for ACF2
- z/OS IBM CICS Transaction Server for ACF2
- z/OS IBM Health Checker for ACF2
- z/OS IBM System Display and Search Facility (SDSF) for RACF
- z/OS ICSF for ACF2
- z/OS NetView for ACF2
- z/OS Quest NC-Pass for ACF2
- z/OS ROSCOE for ACF2
- z/OS SRRAUDIT for ACF2
- z/OS SRRAUDIT for RACF
- z/OS TADz for RACF
- z/OS TDMF for RACF
- z/OS VSS for RACF
- z/OS BMC CONTROL-D for RACF
- z/OS BMC CONTROL-M for RACF
- z/OS BMC CONTROL-M/Restart for RACF
- z/OS BMC CONTROL-O for RACF
- z/OS BMC IOA for RACF
- z/OS BMC MAINVIEW for z/OS for RACF
- z/OS CA 1 Tape Management for RACF
- z/OS CA Auditor for RACF
- z/OS CA Common Services for RACF
- z/OS CA MICS for RACF
- z/OS CA MIM for RACF
- z/OS CA VTAPE for RACF
- z/OS Catalog Solutions for RACF
- z/OS CL/SuperSession for RACF
- z/OS Compuware Abend-AID for RACF
- z/OS CSSMTP for RACF
- z/OS FDR for RACF
- z/OS HCD for RACF
- z/OS IBM Health Checker for RACF
- z/OS IBM CICS Transaction Server for RACF
- z/OS ICSF for RACF
- z/OS NetView for RACF
- z/OS Quest NC-Pass for RACF
- z/OS RACF
- z/OS ROSCOE for RACF
- z/OS IBM System Display and Search Facility (SDSF) for TSS
- z/OS ICSF for TSS
- z/OS NetView for TSS
- z/OS Quest NC-Pass for TSS
- z/OS ROSCOE for TSS
- z/OS SRRAUDIT for TSS
- z/OS TADz for TSS
- z/OS TDMF for TSS
- z/OS TSS
- z/OS BMC CONTROL-D for TSS
- z/OS BMC CONTROL-M for TSS
- z/OS BMC CONTROL-M/Restart for TSS
- z/OS BMC CONTROL-O for TSS
- z/OS BMC IOA for TSS
- z/OS BMC MAINVIEW for z/OS for TSS
- z/OS CA 1 Tape Management for TSS
- z/OS CA Auditor for TSS
- z/OS CA Common Services for TSS
- z/OS CA MICS for TSS
- z/OS CA MIM for TSS
- z/OS CA VTAPE for TSS
- z/OS Catalog Solutions for TSS
- z/OS CL/SuperSession for TSS
- z/OS Compuware Abend-AID for TSS
- z/OS CSSMTP for TSS
- z/OS FDR for TSS
- z/OS HCD for TSS
- z/OS IBM CICS Transaction Server for TSS
- z/OS IBM Health Checker for TSS
- HP-UX 11.23
- HP-UX 11.31
- Oracle Linux 5
- Oracle Linux 5
- Oracle Linux 6
- Oracle Linux 6
- SOLARIS 10 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE
- SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE
- Solaris 11 SPARC
- Solaris 11 X86
- SOLARIS 9 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE
- SOLARIS 9 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE
- Red Hat Enterprise Linux 5
- Red Hat Enterprise Linux 6
- Red Hat Enterprise Linux 6
- Windows Firewall with Advanced Security
- Windows 2003 Domain Controller
- Windows 2003 Member Server
- Windows 2008 Domain Controller
- Windows 2008 Member Server
- Windows Server 2008 R2 Domain Controller
- Windows Server 2008 R2 Member Server
- Windows Server 2012 / 2012 R2 Domain Controller
- Windows Server 2012 / 2012 R2 Member Server
- Windows 10
- Windows 7
- Windows 8 / 8.1
- Windows Vista
- Windows XP
- VMware ESX 3 Policy
- VMware ESX 3 Server
- VMware ESX 3 Virtual Center
- VMware ESX 3 Virtual Machine
- VMware ESXi Server 5.0
- VMware vCenter Server Version 5
- VMware ESXi Version 5 Virtual Machine
- VMware NSX Distributed Firewall
- VMware NSX Distributed Logical Router
- VMware NSX Manager
- VMware vSphere ESXi 6.0
- VMware vSphere vCenter Server Version 6
- VMware vSphere Virtual Machine Version 6
- Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
- z/OS IBM System Display and Search Facility (SDSF) for ACF2
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]