Install Secure Client Modules using a Threat Defense
Before you begin
Ensure that you review the Prerequisites for Configuring Secure Client Modules and Guidelines for Configuring Secure Client Modules topics.
Procedure
Step 1 | The administrator creates profiles, if needed, for the required Secure Client modules. |
Step 2 | The administrator uses the management center to:
|
Step 3 | The user uses Secure Client to initiate a VPN connection to the threat defense. |
Step 4 | The threat defense authenticates the user. |
Step 5 | The Secure Client checks for updates. |
Step 6 | The threat defense distributes the Secure Client modules and the profiles on the endpoint. |
What to do next
Configure a Remote Access VPN Group Policy with Secure Client Modules.