Skip to content

Commit 3685233

Browse files
author
Michał Gryczka
committed
FAQ restores
1 parent 9a2189d commit 3685233

18 files changed

+1041
-20
lines changed

src/content/config.ts

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,14 @@ const productFeatures = defineCollection({
2424
}),
2525
});
2626

27+
const faqSchema = defineCollection({
28+
type: "content",
29+
schema: z.object({
30+
title: z.string(),
31+
order: z.number(),
32+
}),
33+
});
34+
2735
const pricingSchema = z.object({
2836
name: z.string(),
2937
order: z.number(),
@@ -67,6 +75,7 @@ const blog = defineCollection({
6775
export const collections = {
6876
"client-features": productFeatures,
6977
"core-features": productFeatures,
78+
faq: faqSchema,
7079
pricing,
7180
roadmap,
7281
blog,

src/content/faq/audit-logging.mdx

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: What auditing features does Defguard offer and how can event logs be integrated with external systems?
3+
order: 12
4+
---
5+
6+
Defguard supports a **full event log** for both administrators (informing about every business event of each user, with detailed indication of VPN location, module, IP addresses) and for each user (detailed tracking of their own system activities).
7+
8+
The event log supports **streaming events to external SIEM systems**, such as:
9+
10+
* **Vector:** A lightweight observability pipeline program, enabling data forwarding to monitoring systems (Datadog, New Relic, Grafana Loki, Prometheus, InfluxDB, ClickHouse), SIEM and logging systems (ElasticSearch, Splunk HEC, Graylog, Mezmo, Axiom), and cloud services (AWS CloudWatch, Kinesis, S3, SNS/SQS; Google Cloud Pub/Sub, Monitoring, Storage).
11+
* **Logstash:** Open-source server-side software that ingests, processes, and forwards data for logging and analysis purposes.
12+
13+
[Audit log and SIEM integration guide](https://docs.defguard.net/about/features-overview)
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: What are the key features of Defguard Desktop and Mobile clients?
3+
order: 9
4+
---
5+
6+
Desktop and Mobile clients offer many features:
7+
8+
* **Automatic configuration synchronization**.
9+
* Support for **multiple VPN locations** and the ability to connect to **multiple Defguard instances**.
10+
* The option to choose whether the VPN should route **only administrator-defined traffic (predefined traffic) or all device traffic (all traffic)**, with the ability to disable this feature in the admin panel.
11+
* The desktop client offers **Grid** views (displaying all VPN locations and their status/statistics) and **Detailed** views (details of the selected location/connection, statistics, activity history).
12+
* An **Enrollment process** for the desktop client, which, during the first configuration, not only automatically configures VPN locations but also allows the user to **securely remotely set the Defguard account password**, verify account data, and display the administrator's contact information.
13+
* Defguard allows each user to **configure their own Desktop & Mobile devices** in their profile, without needing to contact an administrator, with the ability to enable this functionality.
14+
* Support for managing network devices, where an administrator can configure device access to a selected VPN location using a server-side command-line client running as a system service (automatic synchronization) or manual WireGuard configuration (for older devices).
15+
16+
[Details on client behavior customization](https://docs.defguard.net/features/wireguard/behavior-customization)
Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,21 @@
11
---
2-
title: Difference between WireGuard® and defguard
2+
title: What VPN protocol does Defguard use and why is it preferred?
33
order: 1
44
---
55

6-
WireGuard® is a VPN protocol with some low-level command-line tools.
7-
Defguard makes WireGuard® easy to deploy and use, adding additional features like
6+
Defguard uses the **WireGuard** protocol for VPN infrastructure access. It is **technologically and security-wise more modern and secure than SSL VPN and IPsec**. Examples of innovations not supported by IPsec/SSL VPN include:
87

9-
<a
10-
href="https://docs.defguard.net/admin-and-features/wireguard/multi-factor-authentication-mfa-2fa"
11-
target="_blank"
12-
>
13-
real 2FA/Multi-Factor Authentication
14-
</a>
15-
.
8+
* **Stateless:** No session renegotiation, full resilience to packet loss, which means faster connections, resilience to network disruptions and IP changes, and ideal for mobile users, VPN always-on, and roaming.
9+
* **High performance:** WireGuard operates in the system kernel (Linux kernel module), providing 2–5 times faster data transfer than OpenVPN and is significantly more CPU efficient than IPsec.
1610

17-
Defguard has its own VPN <a href="/client/" target="_blank">desktop clients</a> (with mobile clients soon to be released) that include additional functionalities not available in standard WireGuard® clients.
11+
[Learn more about WireGuard and Zero-Trust VPN in the Defguard docs](https://docs.defguard.net/features/wireguard)
1812

19-
Defguard also offers features outside of VPN, such as built-in OpenID Connect SSO, Yubico YubiKey provisioning, and more!
13+
---
14+
15+
**What cryptographic algorithms does WireGuard use in Defguard?**
16+
17+
WireGuard in Defguard uses modern and most secure algorithms, not supporting outdated or insecure algorithms like 3DES, Blowfish, or RSA. These are:
18+
19+
* **ChaCha20** (encryption)
20+
* **Poly1305** (authentication)
21+
* **Curve25519** (key exchange)

src/content/faq/external-idp.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: With which external identity providers does Defguard integrate for MFA and authorization?
3+
order: 6
4+
---
5+
6+
Defguard is the only provider supporting multi-factor authentication using external identity providers and supports VPN authorization with them, such as:
7+
8+
* **Google Workspace**
9+
* **Microsoft EntraID** (formerly Azure EntraID)
10+
* **Okta**
11+
* **JumpCloud**
12+
* **Zitadel**
13+
* Any other provider supporting the **OpenID Connect (OIDC)** protocol
14+
15+
[See all supported external SSO providers](https://docs.defguard.net/about/features-overview)

src/content/faq/hardware-keys.mdx

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
title: What is the purpose of the hardware key configuration module in Defguard?
3+
order: 13
4+
---
5+
6+
Defguard offers a **hardware key configuration and initialization module (Workstation Provisioning)**, which enables simple and secure configuration of **YubiKey hardware keys** for users. These keys are used for authentication (SSH, GPG/FIDO2) as part of multi-factor authentication (MFA). After initialization, the user's profile displays key details such as the YubiKey serial number and associated public keys (SSH and GPG).
7+
8+
[YubiKey provisioning documentation](https://docs.defguard.net/features/yubikey-provisioning)
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Does Defguard act as an Identity Provider (IdP)? What are its capabilities in this regard?
3+
order: 10
4+
---
5+
6+
Yes, Defguard is an **Identity Provider (IdP) compliant with the OIDC (OpenID Connect) protocol**. This allows external applications to be configured to use Defguard as SSO, offering a "Log in with Defguard" option. It provides an easy GUI for application configuration and a list of authenticated applications in each user's profile, with the ability to easily revoke consent for access.
7+
8+
As an IdP, Defguard supports multi-factor authentication using **TOTP, EMAIL one-time passwords, and hardware keys (e.g., YubiKey)** when logging into applications using Defguard-based SSO.
9+
10+
Thanks to its built-in IdP, Defguard provides a single solution for **one login/password and MFA system for logging into business applications and remote access simultaneously**.
11+
12+
[Identity management and SSO details](https://docs.defguard.net/about/features-overview)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
title: What integration methods does Defguard offer for other systems?
3+
order: 16
4+
---
5+
6+
Defguard supports the following integration methods:
7+
8+
* **Full REST API**
9+
* For selected events, **WebHooks configuration**
10+
11+
[Integrations overview: REST API & Webhooks](https://docs.defguard.net/about/features-overview)
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: How does Defguard implement Multi-Factor Authentication (MFA) for WireGuard?
3+
order: 3
4+
---
5+
6+
Defguard is the **only solution that supports Multi-Factor Authentication (MFA) at the WireGuard protocol level**. This means that **every connection undergoes multi-factor authentication**, not just a 2FA process during application startup or configuration, making Defguard offer a **Zero-Trust VPN**. It has advanced MFA methods that support (beyond private and public keys):
7+
8+
* **The first authentication step** (see question 4)
9+
* **The second authentication step** using WireGuard PSK (Pre-Shared Key) keys, which enhances encryption and **protects against post-quantum attacks**.
10+
* **The third level** is the exchange of WireGuard PSK session keys.
11+
* **The fourth level** is the physical configuration of the Gateway server after the entire multi-factor session, without which the VPN server has no configuration for a given client/device.
12+
13+
[See MFA architecture in Defguard docs](https://docs.defguard.net/features/wireguard/multi-factor-authentication-mfa-2fa/architecture)

src/content/faq/mfa-methods.mdx

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: What MFA methods are available in Defguard for the first authentication step?
3+
order: 4
4+
---
5+
6+
For the first authentication step, Defguard supports:
7+
8+
* **Time-Based One-Time Password (TOTP)**, e.g., Google Authenticator or other desktop/mobile applications.
9+
* **Time-based One-Time Password via EMAIL.**
10+
* On mobile devices: **Biometrics (Touch ID, Face ID).**
11+
* In case of integration with an **external identity provider (SSO)**, authentication occurs with that provider (e.g., Google, Microsoft, Okta, JumpCloud, OIDC) through a dedicated authentication session in the browser.
12+
* **Hardware keys** (e.g., YubiKey) are supported when Defguard acts as an embedded identity provider for applications using SSO.
13+
14+
[Explore MFA setup and onboarding](https://docs.defguard.net/using-defguard-for-end-users/instance-configuration)

0 commit comments

Comments
 (0)