Preface |
This Solaris Security Toolkit 4.2 Reference Manual contains reference information for understanding and using the internals of the Solaris Security Toolkit software. This manual is primarily intended for persons who use the Solaris Security Toolkit software to secure Solaris Operating System (OS) versions 2.5.1 through 10, such as administrators, consultants, and others, who are deploying new Sun systems or securing deployed systems. The instructions apply to using the software in either its JumpStart mode or stand-alone mode.
Following are terms used in this manual that are important to understand:
You should be a Sun Certified System Administrator for Solaris or Sun Certified Network Administrator for Solaris. You should also have an understanding of standard network protocols and topologies.
Because this book is designed to be useful to people with varying degrees of experience or knowledge of security, your experience and knowledge will determine how you use this book.
This manual contains reference information about the software components and is structured as follows:
Chapter 1 is an introduction to how to use Solaris Security Toolkit 4.2 software with the Solaris 10 OS.
Chapter 2 provides reference information for using, adding, modifying, and removing framework functions. Framework functions provide flexibility for you to change the behavior of the Solaris Security Toolkit software without modifying source code.
Chapter 3 provides reference information about for using, modifying, and customizing the file templates included in the Solaris Security Toolkit software.
Chapter 4 provides reference information about using, adding, modifying, and removing drivers. This chapter describes the drivers used by the Solaris Security Toolkit software to harden, minimize, and audit Solaris OS systems.
Chapter 5 provides reference information about using, adding, modifying, and removing finish scripts. This chapter describes the scripts used by the Solaris Security Toolkit software to harden and minimize Solaris OS systems.
Chapter 6 provides reference information for using, adding, modifying, and removing audit scripts.
Chapter 7 provides reference information about using environment variables. This chapter describes all of the variables used by the Solaris Security Toolkit software and provides tips and techniques for customizing their values.
This document might not contain information on basic UNIX® commands and procedures such as shutting down the system, booting the system, and configuring devices. Refer to the following for this information:
Typeface[1] |
||
---|---|---|
The names of commands, files, and directories; on-screen computer output |
||
What you type, when contrasted with on-screen computer output |
||
Book titles, new words or terms, words to be emphasized. Replace command-line variables with real names or values. |
Read Chapter 6 in the User's Guide. These are called class options. |
Sun Fire high-end systems refers to these model numbers:
Sun Fire midrange systems refer to these model numbers:
Sun Fire entry-level midrange systems refer to these model numbers:
Solaris Security Toolkit 4.2 software supports SPARC®, 64-bit only, and x86 systems.
Sun support for Solaris Security Toolkit software is available only for its use in the Solaris 8, Solaris 9, and Solaris 10 Operating Systems.
Note - For Solaris Security Toolkit 4.2 software, Solaris 10 can be used only on Sun Fire high-end systems domains, not on the system controller (SC). |
While the software can be used in the Solaris 2.5.1, Solaris 2.6, and Solaris 7 Operating Systems, Sun support is not available for its use in those operating systems.
The Solaris Security Toolkit software automatically detects which version of the Solaris Operating System software is installed, then runs tasks appropriate for that operating system version.
Note in examples provided throughout this document that when a script checks for a version of the OS, it checks for 5.x, the SunOS versions, instead of 2.x, 7, 8, 9, or 10, the Solaris OS versions. TABLE P-1 shows the correlation between SunOS and Solaris OS versions.
If you are using System Management Services (SMS) to run the system controller (SC) on your Sun Fire high-end systems, then Solaris Security Toolkit 4.2 software is supported on all Solaris 8 and 9 OS versions when used with SMS versions 1.3, 1.4.1, and 1.5. No version of SMS is supported on Solaris 10 OS with Solaris Security Toolkit 4.2 software.
Note - For Solaris Security Toolkit 4.2 software, Solaris 10 can be used only on domains, not on the system controller (SC). |
The documents listed as online are available at:
http://www.sun.com/products-n-solutions/hardware/docs/
Software/enterprise_computing/systems_management/sst/index.html
Download PDF and HTML documents, and order printed documents |
||
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
Sun is interested in improving its documentation and welcomes your comments and suggestions. You can submit your comments by going to:
http://www.sun.com/hwdocs/feedback
Please include the title and part number of your document with your feedback:
Solaris Security Toolkit 4.2 Reference Manual, part number 819-1503-10
Copyright © 2005, Sun Microsystems, Inc. All Rights Reserved.