Chat now with support
Chat with Support

Defender 5.8 - Quick Start Guide

Defender Security Policy

A Defender Security Policy object defines a number of authentication settings for Defender users, such as primary and secondary authentication methods, number of allowed failed authentication attempts, lockout and unlock conditions for the user accounts, and allowed logon hours. You can also use a Defender Security Policy object to enable and configure built-in security tokens, such as SMS token, e-mail token, and GrIDsure token.
Explicitly  Assign a policy directly to a user object in Active Directory.
Implicitly  Apply a policy to a user by assigning it to the Defender Security Server or Access Node to which the user belongs.
3
Expand the Defender container, right-click the Policies container, and then from the shortcut menu select New | Defender Policy.

Defender Security Server

A Defender Security Server object represents a computer on which the Defender Security Server component is installed. Therefore, when creating or configuring a Defender Security Policy object, make sure you specify the correct IP address of the corresponding computer in the object properties.
3
Expand the Defender container, right-click the Security Servers container, and then select New | Defender Security Server.

Access Node

An Access Node object defines an IP address or a range of IP addresses from which the Defender Security Server accepts authentication requests. If Access Node is misconfigured, authentication requests may not reach the Defender Security Server and the user cannot get access to the required resources.
3
Expand the Defender container, right-click the Access Nodes container, and then from the shortcut menu select New | Defender Access Node.

Step 4: Program and assign security tokens to users

4
In the dialog box that opens, on the Defender tab, do one of the following:
To assign a software token, click the Program button, and then complete the wizard. If necessary, install the token software on the user’s computer and activate the token by entering the activation code.
To assign a hardware token, click the Add button, and then follow the on-screen instructions.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating