Trusted Solaris Installation and Configuration

Implement Trusted Solaris in Accordance with Site Security

Successfully installing and configuring Trusted Solaris consistent with site security requires understanding the security features of Trusted Solaris and your site security policy. Before attempting to install Trusted Solaris, read Chapter 1, Overview for the steps to implement your site security when installing and configuring the Trusted Solaris environment at your site.