|
|
H
I
K
L
- label ranges
- described, Sensitivity Labels and Clearances
- troubleshooting a workstation with a restricted range, Troubleshoot Login Problems
- labels
- See also clearances
- changing label of data, How to Move Data Between Labels
- changing label of files, How to Move Files Between Labels in Trusted CDE
- changing label on information, Labels and Transactions
- components, Sensitivity Labels and Clearances
- determining by window query, How to Interactively Display a Window Label
- displayed in Trusted Extensions, Labels on Trusted Extensions Desktops
- displayed on desktop, Sensitivity Labels and Clearances
- dominance, Labels and Transactions
- labeled zones, Containers and Labels
- means of protecting data, Trusted Extensions Separates Information by Label
- ranges, Sensitivity Labels and Clearances
- relationships, Labels and Transactions
- sample government labels, Labels and Transactions
- sample industry labels, Sensitivity Labels and Clearances
- sample label relationships, Labels and Transactions
- setting at login, Check Messages and Select Session Type
- setting clearance at login, Single-Level or Multilevel Sessions
- setting session labels
- Check Messages and Select Session Type
- Check Messages and Select Session Type
- types, Sensitivity Labels and Clearances
- visible on desktop, Visible Desktop Security in Trusted Extensions
- .link_files file
- creating, How to Access Initialization Files at Every Label
- described, .link_files File
- troubleshooting, How to Access Initialization Files at Every Label
- linking files at different labels, How to Move Files Between Labels in Trusted CDE
- by using .link_files, How to Access Initialization Files at Every Label
- logging in
- at a different label, How to Log In at a Different Label
- choosing a desktop
- Desktop Choice Before Login
- Choose a Trusted Desktop
- choosing a label or clearance, Check Messages and Select Session Type
- failsafe, Troubleshoot Login Problems
- five steps of, Trusted Extensions Login Process
- reviewing security settings, Check Messages and Select Session Type
- troubleshooting
- Identify and Authenticate Yourself to the System
- Troubleshoot Login Problems
- logging out
- procedure, How to Log Out of Trusted Extensions
- user responsibilities, Trusted Extensions Logout Process
- login process, See logging in
M
- mail security in Trusted Extensions, Mailer Security
- Main Menu, Shut Down, How to Shut Down Your System
- man pages in Trusted Extensions, How to Access the Trusted Extensions Man Pages
- mandatory access control (MAC)
- defined, Mandatory Access Control
- enforced for email, Enforcing MAC for Email Transactions
- mounting, removable media, How to Allocate a Device in Trusted Extensions
- moving
- a window to a workspace at a different label, How to Move a Window to a Different Workspace
- data to different label, How to Move Data Between Labels
- file to different label, How to Move Files Between Labels in Trusted CDE
- multiheaded system, trusted stripe, Visible Desktop Security in Trusted Extensions
- multilevel login, Trusted GNOME, Choose a Trusted Desktop
- multilevel sessions, defined, Single-Level or Multilevel Sessions
N
O
P
- passwords, user responsibilities, Password Security in the Solaris OS
- peripheral devices, See devices
- permissions
- at discretion of file owner, Discretionary Access Control
- user responsibilities, User Responsibilities for Protecting Data
- pfsh command, See profile shell
- policy, See security policy
- Printer tool security in Trusted Extensions, Printer Security
- printing, typical labeled banner page, Printer Security
- procedures, See users
- profile shell, defined, Accessing Applications in Trusted Extensions
- profiles, See rights profiles
- protecting files
- by label, Trusted Extensions Separates Information by Label
- DAC, Discretionary Access Control
- MAC, Mandatory Access Control
- user responsibilities, User Responsibilities for Protecting Data
Q
R
- read access, in labeled environment, Labels and Transactions
- responsibilities
- of administrators, Administration by Role in Trusted Extensions
- users for password security, Password Security in the Solaris OS
- users to clear media, Erasing Data on Objects Prior to Object Reuse
- users to protect data, User Responsibilities for Protecting Data
- users when logging out, How to Log Out of Trusted Extensions
- reviewing security settings
- Last Login dialog box, Review Security Attributes During Login
- procedure during login, Check Messages and Select Session Type
- rights profiles, defined, Accessing Applications in Trusted Extensions
- roles
- adding a labeled workspace, How to Add a Workspace at a Particular Label
- changing workspace label, How to Change the Label of a Workspace
- common roles, Administration by Role in Trusted Extensions
- responsibilities of, Administration by Role in Trusted Extensions
- special user account, Trusted Extensions Enables Secure Administration
- root role, responsibilities, Administration by Role in Trusted Extensions
|
|
|
|