Configuring for Security
Installing Solaris from scratch and applying the latest patches is just the start. Now it is time to configure your Solaris 8 system in a secure manner. This involves changing some default settings and making the required modifications in configuration files. As stated a moment ago, not all changes are appropriate on all systems. Before applying any of these recommendations, carefully consider the implications for your site.
Accounts and Passwords
Although the next chapter is dedicated to authentication and authorization in Solaris, the following sections describe the minimum required modifications.
Delete Unnecessary Accounts
Using userdel or passmgmt, remove the accounts that are not and will not be used on your ...
Get Solaris 8 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.