The next diagram illustrates a scenario where Defender is configured to authenticate the users who access Web sites hosted on Microsoft Internet Information Services (IIS).
In this scenario, the Defender ISAPI Agent must be deployed on the Web Server that hosts the Web sites to be secured with Defender. The ISAPI Agent acts as an ISAPI filter and requires users to authenticate via Defender in order to get access to the Web sites hosted on the Web Server.
Defender can also be configured to authenticate users when they sign in to their workstations running the Windows operating system.
To implement this scenario, you need to install and configure a component called the Defender Desktop Login on each Windows workstation whose users you want to authenticate via Defender.
This section describes how to install Defender for the first time. Before you start, make sure that:
The service account must have the following permissions:
You can install Defender on physical computers or virtual machines. To install Defender for the first time, complete the following steps:
By completing these steps, you get a base Defender configuration which you can then extend to suit your needs. For example, you can extend the base configuration to do the following:
To install the required Defender components