Chat now with support
Chat with Support

Defender 5.8 - Administrator Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Securing PAM-enabled services Defender Management Portal (Web interface) Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Integration with Cloud Access Manager Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Viewing token requests from users

Click the Administer Defender option.
In the right pane, click the Token Requests tab to open a list of token requests.
User  Shows the name of the user who requested a token through the Defender Self-Service Portal.
Token  Shows the type of requested token.
Request Type  Shows the method that was used to deliver the token. Possible methods include immediate token delivery with no user verification, verification via an automated phone call or SMS, verification via e-mail.
Request Date  Shows the date and time when the request was made or completed.
Request Completed  Shows whether the token request was completed.

Using Defender reports

You can start using reports by clicking the Defender reports option on the home page of the portal:
Report Scheduler  Allows you to select a report, configure its settings, and schedule the report for generation.
Scheduled Reports  Provides a list of all reports you have scheduled so far. The items in the list are also called scheduled report definitions. You can use this node to view the details of scheduled reports, immediately generate scheduled reports without waiting for next generation time, or selectively delete the scheduled report definitions you no longer need. Deleting a scheduled report definition stops the generation of the corresponding report but does not delete already generated reports located on the Generated Reports tab.
Generated Reports  Provides a list of reports generated from the corresponding report definitions on the Scheduled Reports tab. You can use this node to view the generated reports and selectively delete the generated reports you no longer need. Deleting a generated report does not affect the underlying scheduled report definition located on the Scheduled Reports tab.

Generating a report

Click the Defender reports option.
In the left pane, click the Report Scheduler tab.
In the right pane, from the Select a report list, select the report you want to schedule and generate.
In the Report settings area, configure settings for your report.
After configuring the report settings, click the Schedule button, and then type the report description and configure the generation schedule. For more information, see Report scheduling settings.
After scheduling your report, you can click the Preview button to display the report you have just created.

Audit trail

The Audit trail report provides information about all user authentication requests processed by a specific Defender Security Server over a specified period of time.
Audit report  This report is generated using the log files whose names have the DSSAudit prefix.
Accounting Report  This report is generated using the log files whose names have the DSSAcct prefix.
Time format  Select the format for displaying times in the report.
Date format  Select the format for displaying dates in the report.
Time zone  Select the time zone for which you want to generate the report.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating