logo   search left
 

 
search icon   menu button  
 
Type 3 or more characters to activate search, first 10 matches shown.
   
 
   

EXPLORE BY SECTION

 

NEWS & EVENTS

 

 

 

CAREERS

 

 

 

ABOUT NETCOM

 

 

 

ORGANIZATIONS

 

 

 

RESOURCE LINKS

 

 

 

 

EXPLORE BY RESOURCE

 

menu sections

 

Facts

 

menu sections

 

Forms

 

menu sections

 

Information

 

menu sections

 

Interactive

 

menu sections

 

Media

 

menu sections

 

Sites & Links

 
 

 

 

 

BROWSE BY SUBECTS



 

About

Contact

FAQ

 
   

SECTIONS

 

News & Events

 

 

 

Careers

 

 

 

About NETCOM

 

 

 

Organizations

 

 

 

Resource Links

 

 

 

 

EXPLORE BY RESOURCE

 

Facts

 

Forms

 

Information

 

Interactive

 

Media

 

Sites & Links

 

 

BROWSE BY SUBECTS

 

View All

 

#

 

A-C

 

D-G

 
 

  

 

H-M

 

N-R

 

S-Z

 


 

About

Contact

FAQ

 

menu sections

 

 

 
 

Header - Text.

 
 
 

Workshop Session Agenda and Sign Up

Click the link below to sign up for our NETCOM Workshop Sessions
https://forms.osi.apps.mil/r/sMjwqVVb1p


 Registration will begin 7 August 2025
 

 
 
 

NETCOM Capabilities & Services

NIPR and CAC Access Required in Order to View the Links Below

 

     

Army Unified Directory Service (AUDS)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-GCC/SitePages/AUDS.aspx

  ►

Army Unified Directory Service (AUDS) is a centralized identity and access management solution designed to streamline and secure user authentication across Army enterprise systems. By consolidating directory services, AUDS enhances interoperability, simplifies user provisioning, and supports zero-trust architecture principles. It enables seamless access to Army applications and data while ensuring compliance with cybersecurity standards and operational readiness.  The GCC Army Unified Directory Service (AUDS) team is responsible for the operations and maintenance of the CONUS DS Active Directory (AD) forests on the NIPR and SIPR networks, portions of the global cloud-based AUDS-U, and the global AUDS-C SIPR AD forest. 
 

 

 
     

Bring Your Own Device (BYOD)

  ►

Link: https://armyeitaas.sharepoint-mil.us/SitePages/BYOD.aspx

  ►

Army Bring Your Own Device (BYOD) is a strategic initiative that enables authorized personnel to securely access Army networks and resources using personal devices. Designed to enhance mobility, flexibility, and productivity, BYOD leverages secure containers, identity management, and zero-trust principles to protect sensitive data while supporting mission requirements. It empowers users to work from anywhere while maintaining compliance with Army cybersecurity standards.

 

 
 

 
     

Global Secure Network (GSN)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/Global-Secure-Network-(GSN).aspx

  ►

Army Global Secure Network (GSN) is a secure, resilient, and scalable communications infrastructure that provides the U.S. Army with global connectivity for mission-critical operations. Designed to support classified and unclassified data transmission, GSN integrates advanced encryption, zero-trust architecture, and cloud-based services to ensure secure access to Army resources worldwide. It enables seamless collaboration, situational awareness, and operational agility across all domains and theaters.

 

 
 

 
     

Comply-to-Connect (C2C)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/802.1x.aspx

  ►

The Army's C2C (Comply-to-Connect) program is a cutting-edge initiative aimed at enhancing communication and connectivity within the Army's operations. By leveraging advanced technologies and digital solutions, C2C enables seamless information sharing, real-time collaboration, and improved decision-making processes across different Army units and personnel. This program plays a crucial role in optimizing operational efficiency, enhancing situational awareness, and ultimately strengthening the Army's overall effectiveness in various missions and tasks.

 

 
 

 
     

Account Validation System (AVS)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/Account-Validation-System-(AVS).aspx

  ►

The Army's Account Validation System (AVS) is a streamlined digital platform designed to simplify how Army personnel request access to Department of Defense networks and systems. Replacing the older, manual process involving DD Form 2875 and DA Form 7789, AVS automates approvals and eliminates paper-based workflows. It integrates with the Army Enterprise Service Management Platform (AESMP) and supports both baseline and elevated access requests for Soldiers, Civilians, contractors, and foreign nationals. AVS officially launched in April 2025, coinciding with the sunset of the Army Training and Certification Tracking System (ATCTS), and is part of a broader modernization effort led by NETCOM and the Army Deputy Chief of Staff, G-6.

 

 
 

 
     

Army Endpoint Security Solution (AESS)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/AESS.aspx

  ►

The Army Endpoint Security Solution (AESS) is the U.S. Army’s fully managed cybersecurity platform that protects over 800,000 endpoints—including desktops, servers, and virtual machines—across classified and unclassified networks. Delivered by ECS, AESS operates 24/7/365 and uses a zero-trust architecture, advanced threat detection, and real-time cyber threat intelligence to defend against evolving threats.  AESS 2.0, the latest iteration, integrates tools like Microsoft Defender and Elastic, and connects with platforms like Gabriel Nimbus to enhance visibility, automate responses, and support global cyber operations.

 

 
 

 
     

Army Edge Computing Capability (AECC)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-ACDC/SitePages/AECC.aspx

  ►

The Army Edge Computing Capability (AECC) is a transformative initiative designed to deliver standardized, on-demand, scalable, and secure on-premises cloud compute and storage capabilities within Army Enterprise Data Centers (AEDCs), both domestically and abroad. Unlike legacy systems, the AECC integrates within the Army’s hybrid computing environment to enable the hosting of mission-critical applications and data closer to the point of need. The AECC enhances operational resilience and responsiveness, particularly in disconnected, degraded, intermittent, and limited (D-DIL) environments, and supports real-time decision-making in multi-domain operations. The AECC is a cornerstone of the Army’s broader modernization efforts, aligning with initiatives like Project Convergence and the Digital Soldier program to enable data-driven operations. Developed under the leadership of NETCOM and in partnership with Program Executive Office for Enterprise Information Systems (PEO EIS) and Product Director Acquisition, Logistics and Technology Enterprise Systems and Services (PD-ALTESS), AECC is a key component of the Army’s Unified Network Plan and Hybrid Computing Strategy.

 

 
 

 
     

Internet Protocol version 6 (IPV6) Knowledge Base

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3-C4IM/SitePages/IPv6.aspx

  ►

The Army's Internet Protocol version 6 (IPv6) Knowledge Base is a centralized resource designed to support the Department of Defense’s transition to IPv6 across its networks and systems. Managed by the Defense Information Systems Agency (DISA), it offers lessons learned, training materials, and technical guidance for network engineers, cybersecurity professionals, and IT managers involved in IPv6 deployment.  This Knowledge Base plays a key role in helping Army and DoD personnel navigate the shift from IPv4 to IPv6, ensuring compliance with updated DoD policies and enhancing interoperability, scalability, and security across the enterprise. It’s part of a broader effort to modernize the DoD’s digital infrastructure and prepare for future technologies like IoT and AI.

 

 
 

 
     

Army Global Unified Network (AGUN)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/AGUN.aspx

  ►

The Army Global Unified Network (AGUN) is the U.S. Army’s next-generation network architecture designed to unify and modernize communications across all operational domains. AGUN replaces fragmented legacy systems with a standardized, software-defined infrastructure that supports zero trust security, global interoperability, and seamless access to data, applications, and enterprise services. AGUN is being deployed to Army sites worldwide and is a cornerstone of the Army Unified Network Plan, aiming to collapse disparate networks into a single, resilient ecosystem by 2027.

 

 
 

 
     

Army Enterprise Service Desk (AESD) Worldwide

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/NETCOM-G3/SitePages/AESD.aspx

  ►

The Army Enterprise Service Desk–Worldwide (AESD-W) is the Army’s centralized IT support hub, offering 24/7/365 assistance to users across all Army theaters—CONUS and OCONUS. Acting as the primary point of contact for LandWarNet service requests, AESD-W handles incident resolution, service requests, and problem management through phone, email, and the Army Enterprise Service Management Portal (AESMP). It’s more than just tech support—it’s a cyber defense frontline, serving as a human sensor for the Army’s network operations. By analyzing call patterns and ticket data, AESD-W helps identify and mitigate cyber threats in real time2. With its “one desk, one number” model, AESD-W simplifies IT support for over a million Army users worldwide.

 

 
 

 
     

Virtual Modernization Overdrive (V-MOD)

  ►

Link: https://app.mil.powerbigov.us/groups/me/apps/faa4f157-e379-44b7-adae-c9d683377054/reports/17c1652e-4fb7-45da-9598-c003f6046af3/ReportSection6da2e9fa2ba84017365a

  ►

The Army's V-MOD (Virtual Modernization Overdrive) is a digital initiative under the Program Executive Office Enterprise Information Systems (PEO EIS) that supports the Army’s comprehensive network modernization efforts. V-MOD enables collaboration, resource sharing, and communication across modernization teams, helping accelerate upgrades to infrastructure, cybersecurity, and enterprise IT systems.  It’s part of the Army’s push to unify and streamline digital transformation projects, ensuring that modernization efforts are aligned, efficient, and mission ready. V-MOD also serves as a gateway for industry partners and stakeholders to engage with the Army’s evolving tech landscape.

 

 
 

 
     

Data Tagging

  ►

Link: https://armyeitaas.sharepoint-mil.us/SitePages/SensitivityLabels.aspx

  ►

The Army's Data Tagging initiative is a key component of its push toward a data-centric, zero trust environment. Data tagging involves assigning metadata labels—such as identity, role, and access attributes—to data assets, enabling secure sharing, discovery, and automated decision-making across Army systems. By using Controlled Vocabularies (CVs) and standardized metadata, the Army ensures that data is understandable, interoperable, and trusted across domains. This tagging supports Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), helping enforce cybersecurity policies and streamline operations. Ultimately, data tagging empowers Soldiers, analysts, and AI systems to find, interpret, and act on data faster than adversaries, making it a strategic asset in multi-domain operations.

 

 
 

 
     

Army Virtual Desktop (AVD)

  ►

Link: https://armyeitaas.sharepoint-mil.us/sites/AVD

  ►

Army Enterprise Azure Virtual Desktop (AVD) is a Windows 11 virtual machine that you can log in to that is fast and uses your Army 365 credentials for an optimized, full single-sign on, experience. AVD is accessible via the AVD web client without having to install any software or modify your system. However, AVD is BEST experienced from a Windows or MacOS desktop computer, using the Remote Desktop client downloaded from the web (for instructions regarding the browser and desktop client methods, click Setup). Desktop Client (MacOS/Windows) is currently the only method that will allow your CAC to be used for downstream browser logins, S/MIME encryption, etc.

 

 
 

 
     

Zero Trust Army Printing (ZAP)

  ►

Link: https://app.mil.powerbigov.us/groups/me/reports/2183f230-c05c-4347-98e1-13822f4c02dc/ReportSection6515fcc90cfa436eee6b?ctid=fae6d70f-954b-4811-92b6-0530d6f84c43

  ►

The Army Print Logic refers to the Army’s adoption of PrinterLogic, a serverless print management solution that streamlines how users install and access printers across Army networks. By eliminating traditional print servers, PrinterLogic enhances security, reduces IT overhead, and supports Zero Trust architecture—a key priority for Army cybersecurity. This system allows personnel to install printers via a self-service portal, automates driver deployments, and ensures secure document handling, even in virtual desktop environments. It’s part of the Army’s broader modernization efforts to simplify infrastructure while safeguarding sensitive data.

 

 
 
 
 
 

Resources You May Need

 
 

Discover More You May Like