Trusted Solaris Installation and Configuration

Implementing Site Security

Successfully installing and configuring a Trusted Solaris system consistent with site security requires understanding the security features of the Trusted Solaris operating environment and your site security policy. Before attempting to install the Trusted Solaris 8 4/01 software, read Chapter 1, Security Overview for information on how to ensure site security when installing and configuring the Trusted Solaris environment.