O'Reilly logo

Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators by Sander van Vugt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Understanding and Configuring SELinux

Topics covered in this chapter:

  • Understanding SELinux
  • Selecting the SELinux Mode
  • Working with SELinux Context Types
  • Configuring SELinux Policies
  • Working with SELinux Modules
  • Setting up SELinux with system-config-selinux
  • Troubleshooting SELinux

To keep a server really secure, you'll need to make sure that services are monitored and limited in what they can do. That is what SELinux is used for. In this chapter you'll read how to manage SELinux to add more security to your server and limit the chances of security incidents happening.

Understanding SELinux

Permissions are the foundation of all security on your Red Hat Enterprise Linux server. Just using permissions, however, isn't sufficient if you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required