Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Labeling Hosts and Networks

A Trusted Extensions system can contact other hosts only after the system has defined the security attributes of those hosts. Because remote hosts can have similar security attributes, Trusted Extensions provides security templates to which you can add hosts.