Chat now with support
Chat with Support

Defender 5.8 - Administrator Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Securing PAM-enabled services Defender Management Portal (Web interface) Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Integration with Cloud Access Manager Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Configuring ISAPI Agent

Defender Security Servers  Use this area to set up a list of the Defender Security Servers to which you want the ISAPI Agent to connect.
Add  Adds a new entry to the list. After adding a new entry, edit its properties in the Edit DSS Entry area.
Remove  Removes the selected entry from the list.
Edit DSS Entry  Use this area to specify or edit the name, address, port number, and shared secret of the Defender Security Server to which you want the ISAPI Agent to connect.
Name  Type the name of the Defender Security Server you want to use for user authentication.
Address  Type the IP address of the Defender Security Server.
Port  Type the communication port number configured on the access node you want the ISAPI Agent to use.
Shared Secret  Type the shared secret configured on the access node you want the ISAPI Agent to use.
On this tab, select the check boxes next to the websites you want to protect with Defender. By default, Defender protects the whole website. If you want to protect only some parts of the website, use the default.acl file located in the ISAPI Agent installation folder. This file contains two sections where you can list parts that should and should not be protected. When specifying the website’s parts, use relative URLs.

Accessing Protected Website

Securing Windows-based computers

To secure Windows-based computers, in addition to the required Defender components you need to install and configure the component called the Defender Desktop Login on each computer you want to secure with Defender. For more information about installing and configuring the required Defender components, see Deploying Defender.

Installing Defender Desktop Login by using a wizard

1
Run the DefenderDesktopLogin.exe file supplied in the Defender distribution package.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating