O'Reilly logo

Mac® OS X Security by Brian Wotring, Preston Norvell, Bruce Potter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Enterprise Host Configuration

 

Marge: “Well, Homer, I have to admit, you created something people really love. You truly are an artist.”

Homer: “No, I’m just a nut who couldn’t build a barbecue.”

 
 --The Simpsons

Deploying Mac OS X in a small office setting is dramatically different from configuring tens or hundreds of workstations in a lab environment. In a small office, the threats are generally from the network, not from a malicious user sitting at the console. There are not issues regarding distributed authentication mechanisms, and there is usually not a need to create arbitrary connections between hosts; any relationships between machines are generally well-known and static.

However, in a lab or corporate environment, the situation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required