Customizing the User Environment for Security
The following task map describes common tasks that you can perform
when customizing a system for all users, or when customizing an individual
user's account. Many of these tasks are performed before regular users can
log in.
Table 15 Customizing the User Environment for Security Task Map
|
|
|
Change label attributes.
|
Modify label attributes, such as minimum label and default
label view, for a user account.
|
|
Change Trusted Extensions policy for all users of a
system.
See the preceding note.
|
Changes the policy.conf file.
|
|
Removes unnecessary privileges from all regular users of a
system.
|
|
Prevents labels from appearing on printed output at a public
kiosk.
|
|
Configure initialization files for users.
|
Configures startup files, such as
.bashrc, .cshrc, and
.copy_files for all users.
|
|
|