Latest publications

Using Remote Desktop Clients (PDF)

This publication provides guidance on how to secure the use of remote desktop clients for individuals working remotely or from home. Using Remote Desktop Clients (PDF) read more

Using Virtual Private Networks (PDF)

This publication provides guidance on how to securely configure the use of Virtual Private Networks between geographically-separated office buildings (site-to-site VPNs) and in support of remote workers (remote access VPNs). Using Virtual Private Networks … read more

Web Shells - Threat Awareness and Guidance (PDF)

Web shells can be used to leverage unauthorised access and can lead to wider network compromise. This advisory outlines the threat and provides prevention, detection and mitigation strategies for administrators of web servers that have active content languages … read more

Windows Event Logging and Forwarding (PDF)

This publication provides guidance on the configuration of Windows Event Logging and Forwarding functionality to support the detection and remediation of cyber security incidents. Windows Event Logging and Forwarding (PDF) read more

iOS Hardening Configuration Guide for iPod Touch

This publication provides guidance on how to securely configure iPod Touch, iPhone and iPad devices running iOS 9.3.5 or higher. iOS Hardening Configuration Guide for iPod Touch, iPhone and iPad devices running iOS 9.3.5 or higher (PDF) read more