Book Image

CentOS 7 Server Deployment Cookbook

By : Timothy Boronczyk, IRAKLI NADAREISHVILI
Book Image

CentOS 7 Server Deployment Cookbook

By: Timothy Boronczyk, IRAKLI NADAREISHVILI

Overview of this book

CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements. Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. You’ll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS.
Table of Contents (18 chapters)
CentOS 7 Server Deployment Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Working with SELinux for greater security


This recipe shows you the basics of working with Security-Enhanced Linux (SELinux), a kernel extension that adds an extra layer of security to your CentOS installation. Because it runs at the kernel level, SELinux can control access beyond the reach of the traditional filesystem permissions, including restricting running processes and other resources.

Unfortunately, some administrators disable SELinux because admittedly it can be a source of frustration. They're comfortable with the user/group/all and read/write/execute approach and suddenly find themselves at a loss when SELinux blocks something that seems as it should be available. However, the extra layer of security that SELinux provides is worth the effort of investigating such problems and adjusting its policies if necessary.

Getting ready

This recipe requires a CentOS system. Administrative privileges are also required, either by logging in with the root account or through the use of sudo. The...