Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Configure instant messaging authentication

You can implement instant messaging authentication and adapt it to the needs of your network.

Complete the following high-level steps.

  1. Import the IM Authentication rule set from the library.
  2. Review the rules in the rule set and modify them as needed.
    You can, for example, do the following:
    • Modify the settings of the Authentication module for the User Database or the Authentication Server method.
    • Modify the settings of the logging module that handles the logging of information about instant messaging authentication.
  3. Save your changes.
  • Was this article helpful?