• |
The target computer is in a safe location The computer on which you plan to install the required Defender features is in a secure location to which you have physical access, has TCP/IP installed and static IP address, and meets the applicable system requirements described in the Defender Release Notes. |
• |
The account under which you plan to install Defender has sufficient permissions The account under which you will be running the Defender Setup must be a member of the local administrators group. To install the Defender Management Portal, this account must also have the permissions to create and delete child Active Directory objects under the computer account object corresponding to the computer where the Management Portal is installed. |
• |
You have prepared a service account This is the account under which Defender will be accessing Active Directory®. The Defender Setup extends standard Active Directory schema classes and attributes and defines new Defender-specific classes in the Active Directory schema. For more information about these classes and attributes, see “Appendix C: Defender classes and attributes in Active Directory” in the Defender Administrator Guide. |
• |
Authenticate users when they sign in to their Windows®-based computers. For more information, see “Securing Windows-based computers” in the Defender Administrator Guide. |
• |
Authenticate users when they access a PAM-enabled service in UNIX or Linux®. For more information, see “Securing PAM-enabled services” in the Defender Administrator Guide. |
1 |
In the Defender distribution package, open the Setup folder, and run the Defender.exe file. |
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy