We've compiled this collection of the best advice on SELinux, the important security tool integrated into the Linux kernel. Some administrators have perceived SELinux to be too complex to configure, failing to realize the security benefits it can actually provide for Linux systems. But our guide will ease any concerns and show you everything you need to get started -- from managing SELinux policies and access control to configuration and key commands of the security tool.
TABLE OF CONTENTS:
Intro to SELinux | Management | SELinux in RHEL 5
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
|Introduction to SELinux|
SELinux tutorial: Introduction to Linux kernel security
SELinux is often deemed too complex by some Linux administrators, despite its usefulness. Learn how the Linux kernel security tool works and how to manage policy and access control.
When to use SELinux: An introduction to security-enhanced Linux
What is SELinux and when should you use it? This tip describes its origins and some advice for implementing the system in your Linux distribution.
Five ways SELinux may surprise you
In this column, an author and SELinux expert explains five ways the security tool may surprise you, including getting past some common misconceptions.
Red Hat Enterprise Linux security mechanisms: SELinux, iptables and more
SELinux is one of the many Red Hat Enterprise Linux security mechanisms. Learn about these security options and which one is right for your security tasks.
Security face-off: Red Hat’s SELinux vs. SUSE AppArmor, others
SELinux is a security cornerstone of RHEL, but how do other Linux distributions and their offerings stack up? An expert explores SELinux versus SUSE’s AppArmor, among other offerings.
SELinux tutorial: Commands and management
In this tip, learn some key commands and management tools of SELinux to get the security program up and running on your Linux servers.
Using SETools to manage SELinux policies
Configuring SELinux policies can be daunting to administrators, but using the open source SETools can help in writing, analyzing and reporting to easier manage SELinux policies.
|SELinux in RHEL 5|
SELinux tutorial: Configuring RHEL 5 and Web servers
This tip shows you how to configure SELinux in RHEL 5 via the GUI and how to secure Apache Web servers with the security tool.
SELinux in RHEL 5: More enhanced, more security
SELinux has improved functionality in RHEL 5. Here’s some tips on the SELinux Troubleshooter utility, multi-level security integration and deploying the improved SELinux.
With RHEL 5, Red Hat goes to bat for SELinux
Make sure to keep the very useful and powerful security tool SELinux enabled in RHEL 5 for an optimal security experience.