About this Manual

This manual describes cognitix Threat Defender (or Threat Defender for short) version 20211027.0.0. For an overview of the most significant changes in this version, see What’s new in this version?

If you want to read this manual offline, you can open it as PDF.

You can switch between the English and German manual by clicking the respective link at the top of each page.

Intended Audience

This manual is for network administrators and technicians who are responsible for installing and configuring Threat Defender as well as defining the network policy.

To be able to use this manual effectively, a solid background knowledge and experience regarding networking concepts is required.

For users new to Threat Defender, its central terms and concepts are explained under Basic Concepts. They can also find step-by-step instructions to its most important features under Basic Usage.

Users already familiar with Threat Defender can find typical application examples under Advanced Usage.

Conventions

The following typographic conventions and notations are used to represent information in this manual.

Elements of the graphical user interface are indicated as follows:

  • Buttons, checkboxes, list names and other GUI items appear in bold font.

  • List options and literal text appear in a fixed-width font.

  • A sequence of menu commands is indicated as follows: Policy > Network Objects > Static Network Objects. In this case, go to the Policy menu, select Network Objects and open the Static Network Objects tab.

    SNO menucascade

    Policy > Network Objects > Static Network Objects

Links appear as violet text.

Glossary terms appear as green text. Click the term to jump to the respective section in the glossary.

The following types of notes are used to indicate additional information or call attention to a particular point:

Tip

This note contains useful tips that make your work easier.

Note

This note contains important information.

Warning

This note contains information that is very important to consider. If it is not observed, network security may be at risk.