Configure ETP Client

An Enterprise Threat Protector (ETP) super administrator configures the behavior of ETP Client. These settings are applied in approximately 10 minutes to all distributed ETP Clients in your network. For more information on these settings, see ETP Client configuration settings.

How to

  1. In the Enterprise Center navigation menu, select Clients & Connectors > ETP Clients.
  2. Take note of the entitlement code. You can use the entitlement code to activate the ETP desktop or mobile client that you plan to distribute with a device management solution.
  3. Select the Configuration tab.
  4. To forward DNS traffic to ETP, toggle Enable ETP Client to on.
  5. To allow users to disable the client, enable Allow Users to Disable ETP Client.
  6. To identify the user's device name in events that are reported to ETP, enable ETP Client Identity Reporting.
  7. To allow Windows users to uninstall ETP Client from their machines, enable Allow Uninstall on Windows.
  8. To allow automatic security patch upgrades to ETP Clients in your network, enable Automatic Upgrades for Critical Patches.
  9. Toggle the ETP Client Logging field off if you want to partially disable client logging so that the URLs and IP addresses accessed by the end users are not revealed.
  10. To configure ETP Client as the local proxy on the user’s machine, for the Configure ETP Client as local computer web proxy setting, select Yes. Otherwise, you can select Only if there’s no local proxy or No.
  11. To configure the port that’s used by ETP to listen for traffic, enter the port number. By default, ETP Client listens for traffic on port 8080.
  12. Click Save.

Next steps

Configure the internal IP addresses and DNS suffixes that end users can access in the corporate network. See Configure internal IP addresses, DNS suffixes, and email domains.