Successfully installing and configuring a Trusted Solaris system consistent with site security requires understanding the security features of the Trusted Solaris operating environment and your site security policy. Before attempting to install Trusted Solaris 8, read Chapter 1, Security Overview for how to ensure site security when installing and configuring the Trusted Solaris environment.