Prepare the USB Flash Drive  

To install cognitix Threat Defender on physical hardware, you need an installable image.

To be able to use this image, you need to write it to a USB flash drive (2GB or larger).

Note: Any data stored on the USB flash drive will be deleted.


There are various tools for different operating systems for creating a bootable USB flash drive, such as Etcher for Windows, macOS and Linux. See the documentation of your selected tool on how to use it to write the ISO file to the USB flash drive.


Under Linux, you can also manually copy the image to the USB flash drive as follows:

  1. Make sure that the USB drive is unmounted and you know the name of the device.
    In this example, the USB drive is /dev/sdb.
  2. Access the command line interface and run the following command:
sudo cp cgntx_installer_latest.iso /dev/sdb && sync

        Alternatively, you can also use:

sudo dd if=cgntx_installer_latest.iso of=/dev/sdb bs=1M && sync

Remember to replace cgntx_installer_latest.iso with the actual file name of your installation file.


Start the Installation


Tips:

  • If you install the software on a headless device using a serial console, there may be issues when using special characters. Try to avoid this by using an EN keyboard layout.
  • Depending on your hardware equipment, autonegotiation for the network ports may have to be disabled (best case: device AND switch). Otherwise, Threat Defender may configure the management interface before the network card has a proper IP state for the dedicated management LAN port, for example. Threat Defender may then start without having an IP address.


Setup

After preparing the USB flash drive, proceed as follows:


  1. Insert the USB flash drive with the installation image into your appliance.
  2. Make sure that your appliance boots from USB.
    In BIOS, select the USB flash drive as Boot Option.
  3. Reboot your appliance.
    The device boots from the USB flash drive and starts the installation. An installation wizard guides you through the installation process.
  4. Select Yes to confirm that the installer may delete your hard disk.
  5. Select the time zone as required.
    You can also change the time zone via the GUI when the installation is complete, see Changing the Hostname and Time Settings.
  6. The installer prompts you to change the system date and time. If the settings are correct, select No and proceed with checking the usable network cards.
    Otherwise, select Yes to change the date using the date picker.
  7. The system checks the link status of the usable network cards. Select Skip if you wish to omit this step.
  8. Select the interface you want to use for out-of-band management (i.e. the management interface).
    The installer automatically detects usable network interfaces. If an interface is connected to a switch, the connection speed is indicated after the MAC address of that interface. Optional:
    • To verify a selected interface, select Identify. This will cause the LEDs of the selected interface to flash.
    • Select Rename if you wish to assign more convenient names to the interface(s).
  9. Enter the hostname of the device.
    Note: Do not use fully qualified domain names (such as td.mydomain.org) as hostnames. Instead, use td in this case.
  10. Enter the IP address of the management interface in CIDR format.
  11. If you want to receive software and signature updates via the Internet, enter your gateway and DNS server.
  12. The last screen displays a summary of the settings and prompts you to confirm that they are correct.
    The installer then creates a new file system. This will take a few minutes.

    When the installation is complete, the appliance shuts down.
    Note: Some appliances do not shut down automatically, but halt instead. In this case, turn your appliance off.

  13. Remove the USB flash drive.

  14. Restart the appliance.


Result

When the appliance is restarted, you see a summary of your settings.


step11-done-after-reboot.png


The installation of Threat Defender is now complete.

To proceed with its configuration, open the specified URL in your browser. We recommend using Chrome.


For information on how to log in, see Signing In.