Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019

Labeling Hosts and Networks

A Trusted Extensions system can contact other hosts only after the system has defined the security attributes of those hosts. Because remote hosts can have similar security attributes, Trusted Extensions provides security templates to which you can add hosts.