Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Customizing the User Environment for Security

The following task map describes common tasks that you can perform when customizing a system for all users, or when customizing an individual user's account. Many of these tasks are performed before regular users can log in.

Table 11-1  Customizing the User Environment for Security Task Map
Task
Description
For Instructions
Change label attributes.
Modify label attributes, such as minimum label and default label view, for a user account.
Change Trusted Extensions policy for all users of a system.
Changes the policy.conf file.
Turns on the screensaver or logs out the user after a set amount of time that the system is idle.
Removes unnecessary privileges from all regular users of a system.
Prevents labels from appearing on printed output at a public kiosk.
Configure initialization files for users.
Configures startup files, such as .bashrc, .cshrc, .copy_files, and .soffice for all users.
Log in to a failsafe session.
Fixes faulty user initialization files.