This chapter guides through the CA Access Control UNIX endpoint installation process. When you have finished installing CA Access Control following the instructions in this chapter, your system should contain a copy of the CA Access Control endpoint software and an elementary CA Access Control database. The chapter then explains how to start CA Access Control and how to use its commands. Later, by editing the database, you can define access rules to protect your system.
This section contains the following topics:
Configure Post-Installation Settings
Configure an Endpoint for Advanced Policy Management
Configure a UNIX Endpoint for Reporting
Maintenance Mode Protection (Silent Mode)
Solaris 10 Zones Implementation
Start CA Access Control Automatically
Using the Service Management Facility to Manage CA Access Control
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |