Changeset 38559 in vbox
- Timestamp:
- Aug 29, 2011 1:38:00 PM (13 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/doc/manual/en_US/user_Security.xml
r38556 r38559 23 23 software versions and patches up to date. Activate the VirtualBox 24 24 update notification to get notified when a new VirtualBox release 25 is available. When updating VirtualBox, do n't forget to update25 is available. When updating VirtualBox, do not forget to update 26 26 the Guest Additions. Keep the host operating system as well as the 27 27 guest operating system up to date. … … 47 47 <para> 48 48 The principle of least privilege states that users should be given the 49 least amount of privilege to perform their jobs. Execute VirtualBox50 a lways as regular user. We strongly discourage from executing49 least amount of privilege necessary to perform their jobs. Always execute VirtualBox 50 as a regular user. We strongly discourage anyone from executing 51 51 VirtualBox with system privileges. 52 52 </para> … … 58 58 <glossdef> 59 59 <para> 60 System security stands on three legs: good security protocols, proper60 System security builds on three pillars: good security protocols, proper 61 61 system configuration and system monitoring. Auditing and reviewing audit 62 records address th isthird requirement. Each component within a system62 records address the third requirement. Each component within a system 63 63 has some degree of monitoring capability. Follow audit advice in this 64 64 document and regularly monitor audit records. … … 101 101 regular case is to install the complete VirtualBox package. The installation 102 102 must be done with system privileges. All VirtualBox binaries should be 103 executed as regular user and never asprivileged user.103 executed as a regular user and never as a privileged user. 104 104 </para> 105 105 <para> 106 106 The Oracle VM VirtualBox extension pack provides additional features 107 107 and must be downloaded and installed separately, see 108 <xref linkend="intro-installing"/>. Like the forbase package, the SHA256108 <xref linkend="intro-installing"/>. As for the base package, the SHA256 109 109 checksum of the extension pack should be verified. As the installation 110 110 requires system privileges, the VirtualBox GUI will ask for the system … … 118 118 Normally there is no post installation configuration of VirtualBox components 119 119 required. However, on Solaris and Linux hosts it is necessary to configure 120 the proper permissions for users executing VMs whichshould be able to120 the proper permissions for users executing VMs and who should be able to 121 121 access certain host resources. For instance, Linux users must be member of 122 122 the <emphasis>vboxusers</emphasis> group to be able to pass USB devices to a … … 167 167 <para> 168 168 If bridged networking is used, the VM acts like a computer inside 169 the same network ingas the host, see <xref linkend="network_bridged"/>.169 the same network as the host, see <xref linkend="network_bridged"/>. 170 170 In this case, the guest has the same network access as the host and 171 171 a firewall might be necessary to protect other computers on the … … 176 176 </para> 177 177 <para> 178 Some setups do n't require a VM to be connected to the public network178 Some setups do not require a VM to be connected to the public network 179 179 at all. Internal networking (see <xref linkend="network_internal"/>) 180 180 or host-only networking (see <xref linkend="network_hostonly"/>) … … 196 196 <title>Clipboard</title> 197 197 <para> 198 The shared clipboard allows to share data between the host and198 The shared clipboard allows users to share data between the host and 199 199 the guest. Enabling the clipboard in "Bidirectional" mode allows 200 200 the guest to read and write the host clipboard. The "Host to guest" 201 201 mode and the "Guest to host" mode limit the access to one 202 202 direction. If the guest is able to access the host clipboard it 203 could also access sensitive data from the host which areshared over203 could also access sensitive data from the host which is shared over 204 204 the clipboard. 205 205 </para> … … 314 314 315 315 <listitem> 316 <para> All traffic sent over anUDP Tunnel network attachment is not316 <para>Traffic sent over a UDP Tunnel network attachment is not 317 317 encrypted. You can either encrypt it on the host network level (with 318 318 IPsec), or use encrypted protocols in the guest network (such as
Note:
See TracChangeset
for help on using the changeset viewer.