2. Before You Start

System Requirements
To use cognitix Threat Defender certain hardware requirements have to be fulfilled. To get an optimal experience additional recommendations are given below....
Tue, 19 Jun, 2018 at 11:23 AM
Pay Attention To Network Switches When Using Threat Defender
When using the cognitix Threat Defender in your switched network, keep in mind that only traffic passing the Threat Defender can be analyzed. Due to the ne...
Tue, 12 Dec, 2017 at 2:17 PM
Connection Handling
Threat Defender uses connection tracking to enforce firewall rules and to monitor network traffic. The size of the connection tracking table depends on ...
Tue, 12 Dec, 2017 at 4:15 PM
Getting a Free Trial License
Path: Settings - License If you did not receive a Threat Defender trial license via email, e.g. because you got the installation disk at a fair, conferenc...
Thu, 4 Jan, 2018 at 10:39 AM
Using the SSL Proxy
If you plan to use the integrated SSL proxy to inspect the secured data, please pay attention to the following facts: You need to know exactly what an SS...
Fri, 15 Dec, 2017 at 2:35 PM