1. Introduction to Solaris Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
Mailer Security
How to Shut Down Your System
How to Access the Trusted Extensions Man Pages
Mandatory Access Control
Enforcing MAC for Email Transactions
How to Allocate a Device in Trusted Extensions
How to Move a Window to a Different Workspace
How to Move Data Between Labels
How to Move Files Between Labels in Trusted CDE
Visible Desktop Security in Trusted Extensions
Logging In Remotely to Trusted Extensions
Choose a Trusted Desktop
Single-Level or Multilevel Sessions