Content written for

Small & medium business
Large organisations & infrastructure
Government

This page lists the ACSC’s publications on the hardening of applications and ICT equipment.

End of Support for Microsoft Windows and Microsoft Windows Server

Support for Microsoft Windows users following the expiration of the specified servicing timeline.

Hardening Linux Workstations and Servers

This publication has been developed to assist organisations in understanding how to harden Linux workstations and servers.

Hardening Microsoft 365, Office 2021, Office 2019 and Office 2016

Workstations are often targeted by adversaries using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening applications on workstations is an important part of reducing this risk.

Hardening Microsoft Windows 10 version 21H1 Workstations

Workstations are often targeted by an adversary using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 version 21H1.

Implementing Application Control

Application control is one of the most effective mitigation strategies in ensuring the security of systems. As such, application control forms part of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents. This publication provides guidance on what application control is, what application control is not, and how to implement application control.

Implementing Multi-Factor Authentication

This publication has been developed to provide guidance on what multi-factor authentication is, different multi-factor authentication methods that exist and why some multi-factor authentication methods are more secure, and therefore more effective, than others.

IoT Code of Practice – Guidance for Manufacturers

The ACSC has produced this guide to help manufacturers implement 13 principles to provide better protection for consumers when it comes to Internet of Things (IoT) devices.

Microsoft Office Macro Security

This publication has been developed to discuss approaches that can be applied by organisations to secure systems against malicious macros while balancing both their business and security requirements.

Mitigating Drive-by Downloads

Guidance on how drive-by-downloads operate and mitigation strategies on how to prevent an attack.

Mitigating Java-Based Intrusions

Advice on Java-related security issues, and how to use Java securely.

Mitigating the Use of Stolen Credentials

Information is often vulnerable to compromise through the use of stolen credentials. Learn about the risks posed by the use of stolen credentials and how to mitigate them.

Was this information helpful?

Thanks for your feedback!

Optional

Tell us why this information was helpful and we’ll work on making more pages like it