Skip to main content
This is currently an alpha release and I'm looking for constructive feedback, please
file any issues on Github.
Course
Blog
GitHub
[Lab 2] Defending a vulnerable application
5. Deploying in enforcing-mode and rebooting
Overview
Previous
4. Use permissive-mode to iteratively refine your policy
Next
Productionizing SELinux deployments