Penetration Testing Tip #28: Securing and Hardening Tips
Hits:
Failed to execute CGI : Win32 Error Code = 3
This page will focus tutorials on the general area of securing and hardening OSs. If you have a link you wish to recommend or a link goes dead, .
Firewalls & Bastion Hosts
Treachery unlimited site
Unix
Armoring Linux
Preparing your linux box for the Internet
Securing Your Linux Box
FreeBSD Hardening Project
Hardening RedHat Linux with Bastille
Armoring Solaris
Preparing solaris for a firewall
Hardening Solaris with Yassp
CERT : Installing and securing Solaris 2.6 servers
CERT : UNIX Configuration Guidelines
Building a Bastion Host Using HP-UX 11
First Ten Steps to Securing a UNIX Host
Windows
Armoring NT
Preparing NT for a firewall
Baseline Security Analyzer
Microsoft
Building an NT bastion host in practice
Checklist : Windows 2000 Security
LabMice
Checklist : Windows 2000 Security
Microsoft
Checklist : Windows XP Security
Microsoft
IPSec in Windows 2000 and XP
Locking down NT host for Intrusion Detection
Microsoft Security Checklists
NT, Administrator's Workstation, Protecting Hardening
NT Security
Burton Group
NT Security Guidelines, Trusted Systems' Windows
NT Security Steps
NT Security Graded Security Configuration Document
Hardening Windows 2000
pdf
Hardening Windows 2000, Part One: Seeing the Forest In Spite of the Trees
Hardening Windows 2000, Part Two: Seeing the Forest In Spite of the Trees
Hardening Windows 2000, Part Three: Seeing the Forest In Spite of the Trees
IIS 5.0 and Windows 2000 Hardening Guide
NSA Windows 2000 Security Guidelines
Securing Windows 2000
Sans
Securing Windows 2000 Server : Microsoft Solution
Local Area Network Security Guidelines
NIST's Information Technology Laboratory Security Bulletins