Previous Topic: Uninstall CA Access Control Silently

Next Topic: Before You Begin

Installing and Customizing a UNIX Endpoint

This chapter guides through the CA Access Control UNIX endpoint installation process. When you have finished installing CA Access Control following the instructions in this chapter, your system should contain a copy of the CA Access Control endpoint software and an elementary CA Access Control database. The chapter then explains how to start CA Access Control and how to use its commands. Later, by editing the database, you can define access rules to protect your system.

This section contains the following topics:

Before You Begin

Native Installations

Regular Script Installations

Configure Post-Installation Settings

Start CA Access Control

Configure an Endpoint for Advanced Policy Management

Configure a UNIX Endpoint for Reporting

Customizing CA Access Control

Maintenance Mode Protection (Silent Mode)

Solaris 10 Zones Implementation

Start CA Access Control Automatically

Using the Service Management Facility to Manage CA Access Control