Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11.1 Information Library |
1. Overview of Oracle Solaris Security
2. Configuring Oracle Solaris Security
Installing the Oracle Solaris OS
How to Disable Unneeded Services
How to Remove Power Management Capability From Users
How to Place a Security Message in Banner Files
How to Place a Security Message on the Desktop Login Screen
How to Set Stronger Password Constraints
How to Set Account Locking for Regular Users
How to Set More Restrictive umask Value for Regular Users
How to Audit Significant Events in Addition to Login/Logout
How to Monitor lo Events in Real Time
How to Remove Unneeded Basic Privileges From Users
How to Display a Security Message to ssh Users
Protecting File Systems and Files
How to Limit the Size of the tmpfs File System
Protecting and Modifying Files
Securing Applications and Services
Creating Zones to Contain Critical Applications
Adding SMF to a Legacy Service
Creating a BART Snapshot of the System
Adding Multilevel (Labeled) Security
Configuring Trusted Extensions
At this point, you might have created users who can assume roles, and have created the roles. Only the root role can modify system files.
|