Chapter 8

Understanding and Configuring SELinux

Topics covered in this chapter:

  • Understanding SELinux
  • Selecting the SELinux Mode
  • Working with SELinux Context Types
  • Configuring SELinux Policies
  • Working with SELinux Modules
  • Setting up SELinux with system-config-selinux
  • Troubleshooting SELinux

To keep a server really secure, you'll need to make sure that services are monitored and limited in what they can do. That is what SELinux is used for. In this chapter you'll read how to manage SELinux to add more security to your server and limit the chances of security incidents happening.

Understanding SELinux

Permissions are the foundation of all security on your Red Hat Enterprise Linux server. Just using permissions, however, isn't sufficient if you ...

Get Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.