Chatta subito con l'assistenza
Chat con il supporto

Change Auditor for Defender 7.4 - User Guide

Change Auditor for Defender Overview

Introduction

Defender enhances security by enabling two-factor authentication to network, web, and applications-based resources. It is designed to base all administration and identity management on an organization’s existing investment in Active Directory and eliminate the costs and time involved in setting up and maintaining proprietary databases. In addition, Defender works with any OATH-compliant hardware token enabling organizations to select the most appropriate token for their users. By leveraging an organization’s existing investment in Active Directory and supporting multiple token vendors, Defender enables organizations to increase security and achieve and sustain compliance in a cost-effective manner.

Specifically, Defender auditing:

This guide has been prepared to assist you in becoming familiar with Change Auditor for Defender. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product.

Deployment requirements

For a successful deployment, ensure that your environment meets the minimum system requirements. For information on system requirements, see the Change Auditor Release Notes. For details on installing Change Auditor, see the Change Auditor Installation Guide.

 

Getting Started

Strumenti self-service
Knowledge Base
Notifiche e avvisi
Supporto prodotti
Download di software
Documentazione tecnica
Forum utente
Esercitazioni video
Feed RSS
Contatti
Richiedi assistenza sulle licenze
Supporto tecnico
Visualizza tutto
Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione