Customizing the User Environment for Security
The following task map describes common tasks that you can perform when
customizing a system for all users, or when customizing an individual user's
account. Many of these tasks are performed before regular users can log in.
Table 11-1 Customizing the User Environment for Security Task Map
| | |
Change label attributes.
| Modify label attributes, such as minimum label and default label view,
for a user account.
|
|
Change Trusted Extensions policy for all users of a system.
| Changes the policy.conf file.
|
|
Turns on the screensaver or logs out the user after a set amount of
time that the system is idle.
|
|
Removes unnecessary privileges from all regular users of a system.
|
|
Prevents labels from appearing on printed output at a public kiosk.
|
|
Configure initialization files for users.
| Configures startup files, such as .bashrc, .cshrc, .copy_files, and .soffice for
all users.
|
|
Log in to a failsafe session.
| Fixes faulty user initialization files.
|
|
|