Latest publications 31 Oct 2025 Microsoft Exchange Server security best practices This paper—authored by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and Canadian Centre for Cyber Security (Cyber Centre)—provides security best practices for administrators on hardening on-premises (on-prem) Exchange. 30 Oct 2025 Cyber security priorities for boards of directors 2025-26 This advice outlines questions boards can ask of management and their organisation to understand its cyber security posture in the current cyber threat environment. 28 Oct 2025 Creating and maintaining a definitive view of your operational technology architecture How organisations who deploy or operate operational technology systems should build, maintain and store their systems understanding. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 06 Oct 2021 Security configuration guide: Apple iOS 14 devices ASD has developed this guide to assist Australians to understand risks when deploying iOS 14 devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Security configuration guide: Samsung Galaxy S10, S20 and Note 20 devices ASD has developed this guide to assist Australian’s to understand risks when deploying Samsung Galaxy and Samsung Note devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Security configuration guide: Viasat Mobile Dynamic Defense ASD has developed this guide to assist Australian’s to understand risks when deploying Viasat MDD devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Using remote desktop clients Remote access solutions are increasingly being used to access organisations’ systems and data. One common method of enabling remote access is to use a remote desktop client. This publication provides guidance on security risks associated with the use of remote desktop clients. 06 Oct 2021 Web conferencing security Web conferencing tools are essential for meeting with colleagues and clients online. This guide provides tips on how to choose a secure web conference provider, and what risks to be aware of. 06 Oct 2021 Windows event logging and forwarding This publication has been developed as a guide to the setup and configuration of Microsoft Windows event logging and forwarding. Pagination Previous page ‹‹ Page 21 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary