Defender 5.7 - Token Deployment System Quick Start Guide



Similar documents
OneLogin Integration User Guide

NSi Mobile Installation Guide. Version 6.2

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

IIS, FTP Server and Windows

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

NetWrix SQL Server Change Reporter. Quick Start Guide

How to set up Outlook Anywhere on your home system

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

NovaBACKUP xsp Version 15.0 Upgrade Guide

Defender Delegated Administration. User Guide

Cloud Services ADM. Agent Deployment Guide

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

EMR Link Server Interface Installation

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Installation Guide v3.0

NTP Software File Auditor for Windows Edition

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: Digita Sales: digita.com

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Installation Guide for Pulse on Windows Server 2012

Employee Active Directory Self-Service Quick Setup Guide

Defender Configuring for Use with GrIDsure Tokens

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

Active Directory Management. Agent Deployment Guide

Quest Soft Token for Windows Phone User Guide

Active Directory integration with CloudByte ElastiStor

Installation Guide for Pulse on Windows Server 2008R2

HP Client Automation Standard Fast Track guide

CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL

Mobile Device Management Version 8. Last updated:

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

Business mail 1 MS OUTLOOK CONFIGURATION... 2


Professional Mailbox Software Setup Guide

Universal Management Service 2015

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

SevOne NMS Download Installation and Implementation Guide

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Dynamic DNS How-To Guide

Sage 200 Web Time & Expenses Guide

8.7. NET SatisFAXtion Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents

Lync Online Deployment Guide. Version 1.0

Epic Remote Access for Mobile Devices FAQ and Setup

IMDG Code for Intranet

System Administration Training Guide. S100 Installation and Site Management

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

PaperClip. em4 Cloud Client. Manual Setup Guide

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Using Internet or Windows Explorer to Upload Your Site

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

LifeSize Control Installation Guide

setup information for most domains hosted with InfoRailway.

Dell One Identity Cloud Access Manager Installation Guide

This tutorial provides detailed instructions to help you download and configure Internet Explorer 6.0 for use with Web Commerce application.

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Updated: 7/10/2013 Author: Tim Unten

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Copyright 2013, 3CX Ltd.

Installing Logos SSL Certificates on Mobile Devices

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

VisiCount Installation. Revised: 8/28/2012

Mobile Iron User Guide

Let's Setup Your New Account.

CHAPTER 1 Exploring Mobile Devices with IMail 1

Preparing your MAC Computer to access QuickBooks Hosted with the Citrix Receiver or Online Plugin

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

WhatsUp Gold v16.1 Installation and Configuration Guide

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN June 2009

Defender EAP Agent Installation and Configuration Guide

Quest Soft Token for Windows Mobile User Guide

NeoMail Guide. Neotel (Pty) Ltd


Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011

Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect.

Configuring an Client to Connect to CASS Mail Servers

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Defender Group Policy Templates Installation and Configuration Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Richmond Systems. SupportDesk Web Interfaces - Quick Start Guide

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

NETWRIX CHANGE NOTIFIER

Set Up Setup with Microsoft Outlook 2007 using POP3

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Configuration Guide - OneDesk to SalesForce Connector

Front Desk Web Appointment Book Installation

SiteCount v2.0 Revised: 10/30/2009

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

MultiSite Manager. User Guide

Transcription:

Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register Defender hardware and software tokens. For detailed information on these topics, please refer to the: Defender Management Portal Installation and Configuration Guide Defender Token Deployment System User Guide For Defender 5.7, the Token Deployment System is included within the Defender Management Portal. Installation Pre-requisites The Defender Management Portal requires the following software: Microsoft Windows Server 2003, 2008 or 2008 R2 located in the same domain as your Defender system (x86 and x64 servers are supported) Microsoft IIS for Windows Server with ASP.NET 2 Microsoft.NET Framework 3.5 (available on the Defender Installation CD as a Redistributable) Adobe Flash Player installed on the machine you will use to display the Defender Management Portal. Before you install Defender, ensure that you have administrative privileges on all the machines on which you install Defender components. When the installation is complete, please ensure that Integrated Windows Authentication is enabled for the Defender Web Interface website.

Installation Select Defender Management Portal from the Defender Autorun, or run DefenderWebInterface.msi - the Defender Management Portal Setup Wizard starts: 1. Accept all the default settings, changing only the port number (80) if required. 2. Check the box to Launch configuration page after install. This option will display the Defender Management Portal in a web browser. Make a note of the URL displayed on this page, eg http://localhost:80/admin 3. Click Next and then Install. 4. When the setup wizard finishes, click Finish to display the Defender Management Portal login page. 5. Login using an account with the correct administrative privileges for your environment. 2

Configuration On the Credentials tab, configure an Active Directory (AD) service account for the Token Deployment System and/or Defender Reports: 1. Enter the domain and username of a domain admin or service account. The permissions required for the service account can be delegated using the Delegate Control wizard from the Defender menu in Active Directory Users and Computers. 2. Enter the password for the account. 3. Re-enter the password to confirm. 4. Click Save. To configure the Token Deployment System, select the Token Deployment System Configuration page: 3

Software Tokens 1. In the Permissions section, enter the name of the AD group that contains the users who are allowed to register the token types. 2. In the User Verification section, select the required Verification Method. If you are selecting the ticket system ensure that the email address to which ticket information will be sent is specified for each Defender user on the General tab of the User Properties dialog in Active Directory. 3. Select Save. Hardware Tokens The URLs required to access the web pages where Defender tokens can be registered are displayed. If your users will be using one particular token type, you can set that token as the default type. The default token type can be registered by accessing the Token Deployment System web page at http://<ip>:port/register where <IP> is the IP address of the Management Portal host machine and the port number configured during setup. If you are using hardware tokens: 1. Select the default token type from the dropdown list. 2. Click Save. Email Settings If you want to use software tokens, enter the details of your SMTP Server on the Email Settings tab. 1. Enter the name or IP Address of the SMTP Server that will be used to send e-mails to Defender token users. 2. Accept the default port number, 25, or change if required. 3. In Email details, enter the Email address that will be displayed in the From field on e-mails sent to software token users. 4. Click Save. PINs If you want your users to use PINs with hardware and / or software tokens enable the required setting and select Save. What Next? For detailed instructions on installing and configuring the Defender Management Portal, please refer to the Defender Management Portal Installation and Configuration Guide. Token Registration This section is intended for administrators and users who want to self register Defender hardware tokens and software tokens using the Defender Token Deployment System. 4

Hardware Token Registration Your administrator will: provide you with a token provide you with the web page address for the Token Deployment System. 1. Open a browser and access the Token Deployment System website. 2. Select Register a Hardware Token, then select Next. 3. When prompted, enter the serial number located on the back of your token. Click Next. 4. Press the button on your token and enter the passcode shown in the display into the Value displayed: field. Click Next. 5. If prompted, enter a PIN. You will need to enter this PIN each time you use your token. 6. Re-enter the PIN to confirm. Click Next. What Next? For detailed instructions on the use of Defender hardware tokens, please refer to the Defender Hardware Token User Guide. Requesting a Software Token To request a software token: 1. Open a browser and access the Token Deployment System website. 2. Select Request a Software Token. 3. Click the icon for the required token type. If you cannot see the software token you need, contact your administrator for assistance. A message confirms your request and an Email is sent to your address. Follow the instructions provided in the Email to complete the registration process. Activating a Software Token The following steps describe the procedure for activating a Defender software token on a BlackBerry device where your administrator has configured the Token Deployment System to use the ticket system. The procedure is similar for all other supported devices. 1. Locate the token activation email and click the link contained within it. Alternatively, copy and paste the link into your web browser. 2. If prompted, enter a personal identification number (PIN) for your token. If you do not see the Set PIN dialog, skip to step 5. 3. Enter your PIN. You will be prompted to enter the PIN each time you use your token. 4. Re-type your PIN to confirm. 5

5. Click Next. The Install and Activate Token dialog is displayed, which includes information on how to install and activate the token. If the token software is not already installed on your device, you can download it using the Download Token Software link in the email. When the Defender token software is installed on your device, click the Defender Token icon to open the token. You will be prompted to enter the activation code. For BlackBerry, Windows Mobile and Palm (PDA) devices Copy and paste the activation code from the Email into the Defender token, then click Activate. For Android and iphone (or ipad) devices An Activate Token link is provided in the Email. Click this link to automatically copy the activation code to the token. For further information on downloading and installing the Defender token software, please refer to the documentation for your token type. What Next? For detailed instructions on using the Token Deployment System please refer to the Defender Token Deployment System User Guide. For detailed instructions on how to authenticate with a Defender software token, please refer to the Defender documentation for your token type. 2014 Dell Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo and Defender are trademarks of Quest Software, Inc., and its subsidiaries. See http://www.quest.com/legal/trademarks.aspx for a complete list of Quest Software's trademarks. Other trademarks are property of their respective owners. 6