Solaris Trusted Extensions Installation and Configuration

Results of Installing Trusted Extensions From an Administrator's Perspective

After the Trusted Extensions software is installed, the following security features are in place. Many features are configurable by the security administrator.