Welcome to Enterprise Threat Protector

Enterprise Threat Protector (ETP) is a cloud-based, targeted threat protection solution that protects your organization from DNS and web-based threats, enforces authentication and acceptable use policies, and audits user Internet access.

The application is organized into these navigation areas:

  • Configuration: Where an ETP administrator configures items essential to an ETP configuration, such as locations and policies. In a policy, you can also enable the ETP proxy. ETP Proxy intercepts and analyzes suspicious HTTP and HTTPS traffic.
  • Identity: If you enable ETP Proxy, you can enable authentication for users who are connecting to the Internet. An identity provider allows you to assign the users or groups who can access websites. In this area of ETP, you can create identity provider, define multi-factor authentication settings, as well as manage and sync directories.
  • Monitoring: Views of the dashboard, threat and acceptable use policy (AUP) events, and DNS activity. This area allows you to analyze event data. If ETP Proxy is enabled for your organization, you can also view data about network traffic that is directed to ETP and the transactions that are handled by the ETP proxy.
  • Intelligence: Includes an Indicator Search option where you can complete a domain search.
Note: If you are trying ETP with the new Enterprise Center interface, all configuration, identity, and reporting features are accessible from a new navigation menu. To learn more about the new interface, see the Enterprise Threat Protector online help.
Navigation menu
Depending on your administrator role, you may not see all the options that are shown in the navigation menu of this graphic.
Note: If you are a tenant administrator, ETP Proxy is not available with your contract. To upgrade your contract, contact your Akamai representative.

The procedures in this guide are required to set up ETP.