Sun Microsystems, Inc.
spacerspacer
spacer www.sun.com docs.sun.com |
spacer
black dot
 
 
  Previous   Contents   Next 
   
 
Chapter 13

Managing System Security Topics

This topic map identifies the chapters that are related to managing system security in the Solaris environment.

Chapter 14, Managing System Security (Overview)

Provides overview information about file security, system security, and network security.

Chapter 15, Securing Files (Tasks)

Provides step-by-step instructions on how to display file information, change file ownership and file permissions, and set special file permissions.

Chapter 16, Securing Systems (Tasks)

Provides step-by-step instructions on how to check login status, set up dial-up passwords, restrict root access, and monitor root access and su attempts.

Chapter 17, Role-Based Access Control (Overview)

Provides overview information for using role-based access control (RBAC).

Chapter 18, Role-Based Access Control (Tasks)

Provides step-by-step instructions for using RBAC.

Chapter 19, Role-Based Access Control (Reference)

Provides reference information about RBAC.

Chapter 20, Using the Automated Security Enhancement Tool (Tasks)

Provides overview information about the Automated Security Enhancement Tool (ASET) and step-by-step instructions on how to run ASET interactively or periodically (by using a cron job). This chapter also includes information about collecting client ASET reports on a server.

 
 
 
  Previous   Contents   Next