Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Change Auditor for Defender 7.2 - User Guide

Change Auditor for Defender Overview

Introduction

Defender enhances security by enabling two-factor authentication to network, web, and applications-based resources. It is designed to base all administration and identity management on an organization’s existing investment in Active Directory and eliminate the costs and time involved in setting up and maintaining proprietary databases. In addition, Defender works with any OATH-compliant hardware token enabling organizations to select the most appropriate token for their users. By leveraging an organization’s existing investment in Active Directory and supporting multiple token vendors, Defender enables organizations to increase security and achieve and sustain compliance in a cost-effective manner.

Specifically, Defender auditing:

This guide has been prepared to assist you in becoming familiar with Change Auditor for Defender. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product.

Deployment requirements

For a successful deployment, ensure that your environment meets the minimum system requirements. For information on system requirements, see the Change Auditor Release Notes. For details on installing Change Auditor, see the Change Auditor Installation Guide.

 

Getting Started

Outils libre-service
Base de connaissances
Notifications et alertes
Support produits
Téléchargements de logiciels
Documentation technique
Forums utilisateurs
Didacticiels vidéo
Flux RSS
Nous contacter
Obtenir une assistance en matière de licence
Support Technique
Afficher tout
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation