by Devin Yang
(This article was automatically translated.)

Published - 7 years ago ( Updated - 7 years ago )

You can execute the following command to view:
getenforce
appears
Enforcing
Indicates that it is enabled.
Can see configuration file
cat /etc/selinux/config
The result is similar to the following:
# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=enforcing
# SELINUXTYPE= can take one of three two values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted

Tags: linux system

Devin Yang

Feel free to ask me, if you don't get it.:)

No Comment

Post your comment

Login is required to leave comments

Similar Stories


linux

How to install the monitor tool htop on CentOS

Htop is a free (GPL) ncurses-based program monitor tool for Linux. It is similar to top, but allows you to scroll vertically and horizontally, so you can see the full command line running on the system, And you can view them as program trees, select multiple programs and operate them.

linux

How to change timezone on RHEL 7/CentOS7/Fedora

On the new version of RHEL 7/CentOS 7 or Fedora, we can check the status and make adjustments through timedatectl.

linux

How rsync automatically allows ssh key fingerprints

When we use ssh to connect to the host for the first time, a fingerprint confirmation of the host key will be displayed. Sometimes use rsync for some automated scheduling, maybe the remote host has changed and needs to be automatically allowed, How to let ssh automatically allow fingerprints to connect without manually pressing yes in interactive mode?