Completing the Setup
The following sections assist you in completing the setup of Threat Defender.
- Adding a License
- Changing the Hostname and Time Settings
- Creating New System Users
- Changing the Management Interface
- Configuring Proxy Settings
- Updating cognitix Threat Defender
- Defining Update Schedules
- Setting up the User API for User Mapping
- Managing the Processing Interfaces
- Backing up the Configuration
Additional References:
For information on how to install Threat Defender, refer to Installation Preparation and Installation via USB Installer Drive.
For examples that illustrate how to use Threat Defender, see Basic Usage and Advanced Usage.