oracle home
Securing Systems and Attached Devices in Oracle® Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Systems and Attached Devices in ...
»
Index V
Updated: September 2014
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 Managing Machine Security
What's New in Securing Systems and Devices in Oracle Solaris 11.2
Controlling Access to a Computer System
Maintaining Physical Security
Maintaining Login Control
Managing Password Information
Local Passwords
NIS Passwords
LDAP Passwords
Password Encryption
Password Algorithm Identifiers
Algorithms Configuration in the policy.conf File
Special System Accounts
Remote Logins
Controlling Access to Devices
Device Policy
Device Allocation
Controlling Access to Machine Resources
Address Space Layout Randomization
Limiting and Monitoring Superuser Access
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of System Resources
Setting the PATH Variable
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Secure by Default Configuration
Using Resource Management Features
Using Oracle Solaris Zones
Monitoring Use of Machine Resources
Monitoring File Integrity
Controlling Access to Files
Encrypting Files on Disk
Using Access Control Lists
Sharing Files Across Machines
Restricting root Access to Shared Files
Controlling Network Access
Network Security Mechanisms
Authentication and Authorization for Remote Access
Firewall Systems
Encryption and Firewall Systems
Reporting Security Problems
Chapter 2 Protecting Oracle Solaris Systems Integrity
Using Verified Boot
Verified Boot and ELF Signatures
Verification Sequence During System Boot
Policies for Verified Boot
Enabling Verified Boot
SPARC: How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot Support
How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
How to Manually Verify the elfsign Signature
About Trusted Platform Module
Initializing TPM on Oracle Solaris Systems
How to Check Whether the TPM Device Is Recognized by the Operating System
SPARC: How to Initialize TPM Using the Oracle ILOM Interface
x86: How to Initialize TPM Using BIOS
How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore
Troubleshooting TPM
Chapter 3 Controlling Access to Systems
Securing Logins and Passwords
How to Display the User's Login Status
How to Display Users Without Passwords
How to Temporarily Disable User Logins
Changing the Default Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
How to Specify a New Password Algorithm for an NIS Domain
How to Specify a New Password Algorithm for an LDAP Domain
Monitoring and Restricting root Access
How to Monitor Who Is Using the su Command
How to Restrict and Monitor root Logins
Controlling Access to System Hardware
How to Require a Password for SPARC Hardware Access
How to Disable a System's Abort Sequence
Chapter 4 Controlling Access to Devices
Configuring Device Policy
How to View Device Policy
How to Audit Changes in Device Policy
How to Retrieve IP MIB-II Information From a /dev/* Device
Managing Device Allocation
How to Enable Device Allocation
How to Authorize Users to Allocate a Device
How to View Allocation Information About a Device
How to Forcibly Allocate a Device
How to Forcibly Deallocate a Device
How to Change Which Devices Can Be Allocated
How to Audit Device Allocation
Allocating Devices
How to Allocate a Device
How to Mount an Allocated Device
How to Deallocate a Device
Device Protection Reference
Device Policy Commands
Device Allocation
Components of Device Allocation
Device Allocation Service
Device Allocation Rights Profiles
Device Allocation Commands
Authorizations for the Allocation Commands
Allocate Error State
device_maps File
device_allocate File
Device-Clean Scripts
Device-Clean Script for Tapes
Device-Clean Scripts for Diskettes and CD-ROM Drives
Device-Clean Script for Audio
Writing New Device-Clean Scripts
Chapter 5 Virus Scanning Service
About Virus Scanning
About the vscan Service
Using the vscan Service
How to Enable Virus Scanning on a File System
How to Enable the vscan Service
How to Add a Scan Engine
How to View Vscan Properties
How to Limit the Size of Scanned Files
How to Exclude Files From Virus Scans
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index Z
Please tell us how to improve our documentation:
Provide more details about the topic
Fix incorrect information
0 of 500
Provide missing information
0 of 500
Provide translated version
--Select--
Deutsch
Español
Français
Italiano
Português Brasil
日本語
한국어
简体中文
繁體中文
Other Language
Other
0 of 500
Terms of Use |
Your Privacy Rights
Thank you for your feedback! If you want to participate in content improvement and share additional information, please click Feedback button.
Rate this document:
Language:
English
V
variables
CRYPT_DEFAULT
system variable
Algorithms Configuration in the policy.conf File
KEYBOARD_ABORT
system variable
How to Disable a System's Abort Sequence
PATH environment variable
Setting the PATH Variable
verified boot
Using Verified Boot
ELF signatures
Verified Boot and ELF Signatures
enabling
Enabling Verified Boot
local filesystem
Verified Boot and ELF Signatures
managing certificates
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
Oracle ILOM
Verified Boot and ELF Signatures
policies
Policies for Verified Boot
pre-boot environment
Verified Boot and ELF Signatures
SPARC and x86 systems
Enabling Verified Boot
SPARC systems with Oracle ILOM
Enabling Verified Boot
variables or properties for configuration
Policies for Verified Boot
verification sequence
Verification Sequence During System Boot
verified boot certificate
Policies for Verified Boot
Verified Boot and ELF Signatures
viewing
device allocation information
How to View Allocation Information About a Device
device policy
How to View Device Policy
user's login status
How to Display the User's Login Status
users with no passwords
How to Display Users Without Passwords
virus scanning
configuring
Using the vscan Service
described
About the vscan Service
files
About Virus Scanning
viruses
denial of service attack
Using Resource Management Features
Trojan horse
Setting the PATH Variable
vscan
service
About Virus Scanning
vscanadm
command
How to Add a Scan Engine
Previous
Next