Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual

Also see for LINUX ENTERPRISE DESKTOP 11 - ADMINISTRATION GUIDE 17-03-2009: Administration guideDeployment guideApplication guide

Page 1 preview
Page 2 preview
Page 3 preview
Page 4 preview
Page 5 preview
Page 6 preview
Page 7 preview
Page 8 preview
Page 9 preview
Page 10 preview
Page 11 preview
Page 12 preview
Page 13 preview
Page 14 preview
Page 15 preview
Page 16 preview
Page 17 preview
Page 18 preview
Page 19 preview
Page 20 preview
Page 21 preview
Page 22 preview
Page 23 preview
Page 24 preview
Page 25 preview
Page 26 preview
Page 27 preview
Page 28 preview
Page 29 preview
Page 30 preview
Page 31 preview
Page 32 preview
Page 33 preview
Page 34 preview
Page 35 preview
Page 36 preview
Page 37 preview
Page 38 preview
Page 39 preview
Page 40 preview
Page 41 preview
Page 42 preview
Page 43 preview
Page 44 preview
Page 45 preview
Page 46 preview
Page 47 preview
Page 48 preview
Page 49 preview
Page 50 preview
Page 51 preview
Page 52 preview
Page 53 preview
Page 54 preview
Page 55 preview
Page 56 preview
Page 57 preview
Page 58 preview
Page 59 preview
Page 60 preview
Page 61 preview
Page 62 preview
Page 63 preview
Page 64 preview
Page 65 preview
Page 66 preview
Page 67 preview
Page 68 preview
Page 69 preview
Page 70 preview
Page 71 preview
Page 72 preview
Page 73 preview
Page 74 preview
Page 75 preview
Page 76 preview
Page 77 preview
Page 78 preview
Page 79 preview
Page 80 preview
Page 81 preview
Page 82 preview
Page 83 preview
Page 84 preview
Page 85 preview
Page 86 preview
Page 87 preview
Page 88 preview
Page 89 preview
Page 90 preview
Page 91 preview
Page 92 preview
Page 93 preview
Page 94 preview
Page 95 preview
Page 96 preview
Page 97 preview
Page 98 preview
Page 99 preview
Page 100 preview
Page 101 preview
Page 102 preview
Page 103 preview
Page 104 preview
Page 105 preview
Page 106 preview
Page 107 preview
Page 108 preview
Page 109 preview
Page 110 preview
Page 111 preview
Page 112 preview
Page 113 preview
Page 114 preview
Page 115 preview
Page 116 preview
Page 117 preview
Page 118 preview
Page 119 preview
Page 120 preview
Page 121 preview
Page 122 preview
Page 123 preview
Page 124 preview
Page 125 preview
Page 126 preview
Page 127 preview
Page 128 preview
Page 129 preview
Page 130 preview
Page 131 preview
Page 132 preview
Page 133 preview
Page 134 preview
Page 135 preview
Page 136 preview
Page 137 preview
Page 138 preview
Page 139 preview
Page 140 preview
Page 141 preview
Page 142 preview
Page 143 preview
Page 144 preview
Page 145 preview
Page 146 preview
Page 147 preview
Page 148 preview
Page 149 preview
Page 150 preview
Page 151 preview
Page 152 preview
Page 153 preview
Page 154 preview
Page 155 preview
Page 156 preview
Page 157 preview
Page 158 preview
Page 159 preview
Page 160 preview
Page 161 preview
Page 162 preview
Page 163 preview
Page 164 preview
Page 165 preview
Page 166 preview
Page 167 preview
Page 168 preview
Page 169 preview
Page 170 preview
Page 171 preview
Page 172 preview
Page 173 preview
Page 174 preview
Page 175 preview
Page 176 preview
Page 177 preview
Page 178 preview
Page 179 preview
Page 180 preview
Page 181 preview
Page 182 preview
Page 183 preview
Page 184 preview
Page 185 preview
Page 186 preview
Page 187 preview
Page 188 preview
Page 189 preview
Page 190 preview
Page 191 preview
Page 192 preview
Page 193 preview
Page 194 preview
Page 195 preview
Page 196 preview
Page 197 preview
Page 198 preview
Page 199 preview
Page 200 preview
Page 201 preview
Page 202 preview
Page 203 preview
Page 204 preview
Page 205 preview
Page 206 preview
Page 207 preview
Page 208 preview
Page 209 preview
Page 210 preview
Page 211 preview
Page 212 preview
Page 213 preview
Page 214 preview
Page 215 preview
Page 216 preview
Page 217 preview
Page 218 preview
Page 219 preview
Page 220 preview
Page 221 preview
Page 222 preview
Page 223 preview
Page 224 preview
Page 225 preview
Page 226 preview
Page 227 preview
Page 228 preview
Page 229 preview
Page 230 preview
Page 231 preview
Page 232 preview
Page 233 preview
Page 234 preview
Page 235 preview
Page 236 preview
Page 237 preview
Page 238 preview
Page 239 preview
Page 240 preview
Page 241 preview
Page 242 preview
Page 243 preview
Page 244 preview
Page 245 preview
Page 246 preview
Page 247 preview
Page 248 preview
Page 249 preview
Page 250 preview
Page 251 preview
Page 252 preview
Page 253 preview
Page 254 preview
Page 255 preview
Page 256 preview
Page 257 preview
Page 258 preview
Page 259 preview
Page 260 preview
Page 261 preview
Page 262 preview
Page 263 preview
Page 264 preview
Page 265 preview
Page 266 preview
Page 267 preview
Page 268 preview
Page 269 preview
Page 270 preview
Page 271 preview
Page 272 preview
Page 273 preview
Page 274 preview
Page 275 preview
Page 276 preview
Page 277 preview
Page 278 preview
Page 279 preview
Page 280 preview
Page 281 preview
Page 282 preview
Page 283 preview
Page 284 preview
Page 285 preview
Page 286 preview
Page 287 preview
Page 288 preview
Page 289 preview
Page 290 preview
Page 291 preview
Page 292 preview
Page 293 preview
Page 294 preview
Page 295 preview
Page 296 preview
Page 297 preview
Page 298 preview
Page 299 preview
Page 300 preview
Page 301 preview
Page 302 preview
Page 303 preview
Page 304 preview
Page 305 preview
Page 306 preview
Page 307 preview
Page 308 preview
Page 309 preview
Page 310 preview
Page 311 preview
Page 312 preview
Page 313 preview
Page 314 preview
Page 315 preview
Page 316 preview
Page 317 preview
Page 318 preview
Page 319 preview
Page 320 preview
Page 321 preview
Page 322 preview
Page 323 preview
Page 324 preview
Page 325 preview
Page 326 preview
Page 327 preview
Page 328 preview
Page 329 preview
Page 330 preview
Page 331 preview
Page 332 preview
Page 333 preview
Page 334 preview
Page 335 preview
Page 336 preview
Page 337 preview
Page 338 preview
Page 339 preview
Page 340 preview
Page 341 preview
Page 342 preview
Page 343 preview
Page 344 preview
Page 345 preview
Page 346 preview
Page 347 preview
Page 348 preview
Page 349 preview
Page 350 preview
Page 351 preview
Page 352 preview
Page 353 preview
Page 354 preview
Page 355 preview
Page 356 preview
Page 357 preview
Page 358 preview
Page 359 preview
Page 360 preview
Page 361 preview
Page 362 preview
Page 363 preview
Page 364 preview
Page 365 preview
Page 366 preview
Page 367 preview
Page 368 preview
Page 369 preview
Page 370 preview
Page 371 preview
Page 372 preview
Page 373 preview
Page 374 preview
Page 375 preview
Page 376 preview
Page 377 preview
Page 378 preview
Page 379 preview
Page 380 preview
Page 381 preview
Page 382 preview
Page 383 preview
Page 384 preview
Page 385 preview
Page 386 preview
Page 387 preview
Page 388 preview
Page 389 preview
Page 390 preview
Page 391 preview
Page 392 preview
Page 393 preview
Page 394 preview
Page 395 preview
Page 396 preview
Page 397 preview
Page 398 preview
Page 399 preview
Page 400 preview
Page 401 preview
Page 402 preview
Page 403 preview
Page 404 preview
Page 405 preview
Page 406 preview
Page 407 preview
Page 408 preview
Contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. about this guide
  8. documentation conventions
  9. Security and Confidentiality
  10. Some General Security Tips and Tricks
  11. Using the Central Security Reporting Address
  12. Part I Authentication
  13. Authentication with PAM
  14. The PAM Configuration of sshd
  15. Configuration of PAM Modules
  16. For More Information
  17. Configuring NIS Clients
  18. LDAP versus NIS
  19. Structure of an LDAP Directory Tree
  20. Configuring an LDAP Client with YaST
  21. Browsing the LDAP Directory Tree
  22. Active Directory Support
  23. Background Information for Linux AD Support
  24. Configuring a Linux Client for Active Directory
  25. active directory
  26. Logging In to an AD Domain
  27. Changing Passwords
  28. Network Authentication with Kerberos
  29. Kerberos Terminology
  30. How Kerberos Works
  31. Users' View of Kerberos
  32. Using the Fingerprint Reader
  33. Managing Fingerprints with YaST
  34. Part II Local Security
  35. Configuring Security Settings with YaST
  36. Predefined Security Configurations
  37. Password Settings
  38. Boot Settings
  39. User Addition
  40. PolicyKit
  41. Authorization Types
  42. Modifying and Setting Privileges
  43. Access Control Lists in Linux
  44. Advantages of ACLs
  45. Handling ACLs
  46. ACL Support in Applications
  47. Encrypting Partitions and Files
  48. during installation
  49. Using Encrypted Home Directories
  50. Certificate Store
  51. Importing Certificates
  52. Intrusion Detection with AIDE
  53. Local AIDE Checks
  54. System Independent Checking
  55. Part III Network Security
  56. SSH: Secure Network Operations
  57. The ssh Program
  58. SSH Authentication Mechanisms
  59. Configuring An SSH Daemon with YaST
  60. Masquerading and Firewalls
  61. Masquerading Basics
  62. Firewalling Basics
  63. SuSEfirewall2
  64. Configuring VPN Server
  65. Creating the Simplest VPN Example
  66. Setting Up Your VPN Server Using Certificate Authority
  67. configuring the server
  68. KDE- and GNOME Applets For Clients
  69. Managing X.509 Certification
  70. YaST Modules for CA Management
  71. Part IV Confining Privileges with Novell AppArmor
  72. Introducing AppArmor
  73. Getting Started
  74. installing novell apparmor
  75. Choosing the Applications to Profile
  76. Building and Modifying Profiles
  77. Updating Your Profiles
  78. Immunizing Programs
  79. Background Information on AppArmor Profiling
  80. Immunizing cron Jobs
  81. Profile Components and Syntax
  82. Profile Types
  83. include Statements
  84. Capability Entries (POSIX.1e)
  85. Paths and Globbing
  86. File Permission Access Modes
  87. Execute Modes
  88. Resource Limit Control
  89. Auditing Rules
  90. Setting Capabilities per Profile
  91. AppArmor Profile Repositories
  92. Using the External Repository
  93. Building and Managing Profiles with YaST
  94. Adding a Profile Using the Wizard
  95. Manually Adding a Profile
  96. Deleting a Profile
  97. Managing Novell AppArmor and Security Event Status
  98. Building Profiles from the Command Line
  99. Building AppArmor Profiles
  100. Deleting an AppArmor Profile
  101. Two Methods of Profiling
  102. Profiling Your Web Applications Using ChangeHat
  103. Apache ChangeHat
  104. Confining Users with pam_apparmor
  105. Managing Profiled Applications
  106. Configuring Reports
  107. Configuring and Using the AppArmor Desktop Monitor Applet
  108. Updating Novell AppArmor Online
  109. Troubleshooting
  110. Reporting Bugs for AppArmor
  111. AppArmor Glossary
  112. Part V The Linux Audit Framework
  113. Understanding Linux Audit
  114. Introducing the Components of Linux Audit
  115. Configuring the Audit Daemon
  116. Controlling the Audit System Using auditctl
  117. Passing Parameters to the Audit System
  118. Understanding the Audit Logs and Generating Reports
  119. Querying the Audit Daemon Logs with ausearch
  120. Analyzing Processes with autrace
  121. Visualizing Audit Data
  122. Setting Up the Linux Audit Framework
  123. Enabling Audit for System Calls
  124. Setting Up Audit Rules
  125. Configuring Audit Reports
  126. Configuring Log Visualization
  127. Introducing an Audit Rule Set
  128. Adding Watches on Audit Log Files and Configuration Files
  129. Monitoring File System Objects
  130. Monitoring Security Configuration Files and Databases
  131. Monitoring Miscellaneous System Calls
  132. Managing Audit Event Records Using Keys
  133. Useful Resources
/ 408
Related manuals for Novell LINUX ENTERPRISE DESKTOP 11 - ADMINISTRATION GUIDE 17-03-2009
This manual is suitable for:
LINUX ENTERPRISE DESKTOP 11 - ADMINISTRATION GUIDE 17-03-2009SUSE LINUX ENTERPRISE SERVER 10 STORAGE
Manuals database logo
manualsdatabase
Your AI-powered manual search engine