This chapter looked at the many system configuration options and approaches intended to increase the security of Solaris 8 systems. Much of the advice contained here is applicable in almost every circumstance. However, a number of things might not be appropriate for all sites, such as disabling some services or using certain settings. In case you cannot disable a particular service, make sure that you at least control access to it and keep detailed logs. And remember that any system is as secure as its weakest part.