Chapter 1, Administering in a Role reviews how to work in an administrative role.
Chapter 2, Administering Security Requirements describes general security mechanisms and common procedures to harden the system.
Chapter 3, Managing User Accounts describes how to prepare for setting up user and role accounts, and how to administer startup files and batch jobs.
Chapter 4, Managing Users and Rights With SMC describes how to manage rights, roles, and users using the Solaris Management Console.
Chapter 5, Managing Roles describes how to modify and extend the powers of a role.
Chapter 6, Managing Mail describes the differences between standard Solaris and Trusted Solaris mail administration.
Chapter 7, Managing Computers and Networks reviews concepts that apply to managing communications and shows how trusted communications are configured between a Trusted Solaris system and multiple networks.
Chapter 8, Specifying Routing and Security for Remote Computers describes how to specify the security attributes for hosts and how to set up routing for trusted network communications.
Chapter 9, Managing Files and File Systems describes the extended file system security attributes, how to set up mounts, and how to specify extended security attributes.
Chapter 10, Managing Name Services describes how NIS and NIS+ name services can be used to centrally administer a Trusted Solaris network.
Chapter 11, Managing Printing describes how to configure printing for labeled and unlabeled jobs.
Chapter 12, Managing Devices describes how to manage devices, and includes how to set the label range on printers and computers.
Chapter 13, Adding Software describes how to assess software for trustworthiness. Software includes Sun software products, other UNIX® applications, new trusted programs, CDE actions, and shell scripts. The chapter also describes the Trusted Solaris privilege mechanism.