Welcome to Enterprise Threat Protector
Enterprise Threat Protector (ETP ) is a cloud-based, targeted threat protection solution that protects your organization from DNS and web-based threats, enforces authentication and acceptable use policies, and audits user Internet access.
The application is organized into these navigation areas:
- Configuration: Where an ETP administrator configures items essential to an ETP configuration, such as locations and policies. In a policy, you can also enable the ETP proxy. ETP Proxy intercepts and analyzes suspicious HTTP and HTTPS traffic.
- Identity. If you enable ETP Proxy, you can enable authentication for users who are connecting to the Internet. An identity provider allows you to assign the users or groups who can access websites. In this area of ETP, you can create identity provider, define multi-factor authentication settings, as well as manage and sync directories.
- Monitoring: Views of the dashboard, threat and acceptable use policy (AUP) events, and DNS activity. This area allows you to analyze event data. If ETP Proxy is enabled for your organization, you can also view data about network traffic that is directed to ETP and the transactions that are handled by the ETP proxy.
- Intelligence: Includes an Indicator Search option where you can complete a domain search.
The procedures in this guide are required to set up ETP.