Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Resolving Additional Issues Before Enabling Trusted Extensions

Before configuring Trusted Extensions, you must physically protect your systems, decide which labels to attach to zones, and resolve other security issues. For the steps, see Resolving Security Issues Before Installing Trusted Extensions.