Install Secure Client Modules using a Threat Defense

Procedure


Step 1

The administrator creates profiles, if needed, for the required Secure Client modules.

Step 2

The administrator uses the management center to:

  1. Configure the modules and add the profiles in the remote access VPN group policy.

  2. Deploy the configuration on the threat defense.

Step 3

The user uses Secure Client to initiate a VPN connection to the threat defense.

Step 4

The threat defense authenticates the user.

Step 5

The Secure Client checks for updates.

Step 6

The threat defense distributes the Secure Client modules and the profiles on the endpoint.


What to do next

Configure a Remote Access VPN Group Policy with Secure Client Modules.