Trusted Solaris Installation and Configuration

Implement Trusted Solaris in Accordance with Site Security

Successfully installing and configuring a Trusted Solaris system consistent with site security requires understanding the security features of the Trusted Solaris operating environment and your site security policy. Before attempting to install Trusted Solaris 8, read Chapter 1, Security Overview for how to ensure site security when installing and configuring the Trusted Solaris environment.