サポートと今すぐチャット
サポートとのチャット

Defender 6.4.1 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Push Notifications Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Step 1: Install required Defender components

To install the required Defender components

  1. In the Defender distribution package, open the Setup folder, and run the Defender.exe file.
  2. Complete the Defender Setup Wizard to install the required Defender components.
  3. For more information about the wizard steps and options, see Defender Setup Wizard reference.

Step 2: Configure Defender Security Server

Use the Defender Security Server Configuration tool to configure the Defender Security Server you have installed in Step 1: Install required Defender components. By default, this tool starts automatically when you complete the Defender Setup Wizard.

For more information on how to start and use the Defender Security Server Configuration tool, see Defender Security Server Configuration tool reference.

Step 3: Create and configure objects in Active Directory

In this step, you create and configure a number of required Defender-related objects in Active Directory. The required objects are:

For detailed instructions on how to create and configure Defender objects in Active Directory, see “Managing Defender objects in Active Directory” in the Defender Administration Guide.

Defender Security Policy

A Defender Security Policy object defines a number of authentication settings for Defender users, such as primary and secondary authentication methods, number of allowed failed authentication attempts, lockout and unlock conditions for the user accounts, and allowed logon hours. You can also use a Defender Security Policy object to enable and configure built-in security tokens, such as SMS token, e-mail token, and GrIDsure token.

After creating a Defender Security Policy object, you need to assign it to the appropriate user objects in Active Directory. You can assign a Defender Security Policy in one of the following ways:

  • Explicitly  Assign a policy directly to a user object in Active Directory.
  • Implicitly  Apply a policy to a user by assigning it to the Defender Security Server or Access Node to which the user belongs.

If you assign a Defender Security Policy to a Defender Security Server, that policy is applied to the users who authenticate through that Defender Security Server.

If you assign a Defender Security Policy to an Access Node object, that policy is applied to the users who are listed as members of that Access Node.

When a user is a member of an Access Node and no Defender Security Policy is defined for the user explicitly or implicitly, then a default Defender Security Policy applies to the user. For more information, see “Default Defender Security Policy” in the Defender Administration Guide.

To create a Defender Security Policy object

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane, expand the node representing the domain where you installed Defender.
  3. Expand the Defender container, right-click the Policies container, and then from the shortcut menu select New | Defender Policy.

For detailed instructions on how to create and configure a Defender Security Policy object, see “Managing Defender Security Policy objects” in the Defender Administration Guide.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択