Chat now with support
Chat with Support

Change Auditor for Defender 7.2 - User Guide

Change Auditor for Defender Overview

Introduction

Defender enhances security by enabling two-factor authentication to network, web, and applications-based resources. It is designed to base all administration and identity management on an organization’s existing investment in Active Directory and eliminate the costs and time involved in setting up and maintaining proprietary databases. In addition, Defender works with any OATH-compliant hardware token enabling organizations to select the most appropriate token for their users. By leveraging an organization’s existing investment in Active Directory and supporting multiple token vendors, Defender enables organizations to increase security and achieve and sustain compliance in a cost-effective manner.

Specifically, Defender auditing:

This guide has been prepared to assist you in becoming familiar with Change Auditor for Defender. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product.

Deployment requirements

For a successful deployment, ensure that your environment meets the minimum system requirements. For information on system requirements, see the Change Auditor Release Notes. For details on installing Change Auditor, see the Change Auditor Installation Guide.

 

Getting Started

Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating