Enterprise Threat Protector (ETP) with the Enterprise Center interface offers
a new setup workflow that guides you through the process of setting up ETP for your
organization. The setup workflow guides you through the configuration of these major
features:
DNS Security.
Provides steps to quickly get started with ETP. This setup is required for an
ETP implementation.
Selective Proxy.
This configuration of ETP Proxy scans risky web traffic. For more information
about the selective proxy, see Selective proxy.
Full Web Proxy.
This configuration of ETP Proxy scans all web traffic. For more information
about the full web proxy, see Full web proxy.
Identity
Providers. An identity provider (IdP) is a service that creates,
manages, and saves user identity information. Identity providers are required
for implementing user authentication. For more information, see Identity providers. To learn more about user authentication in ETP, see User authentication and group policies.
The setup workflow is available at the top of the Enterprise Center interface when you
click the wand icon. You can access this workflow at any time to guide you through the
process.
The workflow is divided into these setup procedures:
DNS Security Setup
Selective Proxy Setup
Full Proxy Setup
Identity Provider Setup
The steps and the order of steps in each setup procedure are recommended. After you
complete a step and a setup procedure, steps in the workflow change from blue to
green.
You can click a specific step in a workflow to direct you to the interface page where you
can configure the corresponding feature. For example, clicking on Policies in the
workflow directs you to the Policies page where you can add a policy.