Chat now with support
Chat with Support

Defender 5.8 - Administrator Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Securing PAM-enabled services Defender Management Portal (Web interface) Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Integration with Cloud Access Manager Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Access Node

An Access Node object defines an IP address or a range of IP addresses from which the Defender Security Server accepts authentication requests. If Access Node is misconfigured, authentication requests may not reach the Defender Security Server and the user cannot get access to the required resources.
Expand the Defender container, right-click the Access Nodes container, and then from the shortcut menu select New | Defender Access Node.

Step 4: Program and assign security tokens to users

In the dialog box that opens, on the Defender tab, do one of the following:
To assign a software token, click the Program button, and then complete the wizard. If necessary, install the token software on the user’s computer and activate the token by entering the activation code.
To assign a hardware token, click the Add button, and then follow the on-screen instructions.

Defender Setup Wizard reference

Select the I accept these terms check box to accept the terms in the Software Transaction Agreement.
Active Directory Preparation  Installs Active Directory schema extensions, creates and configures control access rights, and creates organizational units required by Defender.
Defender Security Server  Installs a server that performs two-factor authentication of users in your organization. Consider adding a second Defender Security Server to ensure that user authentication continues to work in case the primary Defender Security Server becomes unavailable.
Defender Administration Console  Adds Defender menus and commands into Microsoft’s Active Directory Users and Computers tool.
Defender Management Portal  Installs a Web-based portal that allows administrators to manage and deploy tokens, view Defender logs in real time, troubleshoot authentication issues, and view a number of reports providing information about Defender configuration, users, authentication statistics, audit trail, and security tokens.
Defender Management Shell  Installs a command-line interface that enables the automation of Defender administrative tasks. With the Defender Management Shell, administrators can use Windows PowerShell® scripts to perform token-related tasks such as assign tokens to users, assign PINs, or check for expired tokens.
AD domain or domain controller name  Type the fully qualified domain name of the domain or domain controller in the domain where you want to install Defender.
Connect using  Specify the user account under which you want the Defender Setup to make changes in Active Directory.
You can select the Start Defender Security Server Configuration tool check box to start the configuration tool after you complete the Defender Setup Wizard.

Defender Security Server Configuration tool reference

Windows Server® 2008 R2
Click Start.
Point to All Programs | Dell | Defender.
Click Defender Security Server Configuration.
On the Apps screen, click the Defender Security Server Configuration tile.
Addresses  Set up a list of domains or specific domain controllers to which you want the Defender Security Server to connect to read data in Active Directory.
To add a domain or domain controller to the list, click the Add button, and then enter the DNS name or IP address.
Port  Type the number of the LDAP port on which you want the Defender Security Server to connect to Active Directory. The default port is 389.
SSL port  Type the number of the SSL port on which you want the Defender Security Server to connect to Active Directory. The default SSL port is 0.
User name  Type the user name of the service account under which you want the Defender Security Server to connect to Active Directory. Use either <domain>\<user name> format or distinguished name (DN) as shown on the screenshot above.
Password  Type the password that matches the user name specified in the User name text box.
Click the Test button to check if the specified connection settings are correct. You can select the Test connection automatically check box to automatically test the specified connection settings.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating