Set up Enterprise Threat Protector

Enterprise Threat Protector (ETP) with the Enterprise Center interface offers a new setup workflow that guides you through the process of setting up ETP for your organization. The setup workflow guides you through the configuration of these major features:
  • DNS Security. Provides steps to quickly get started with ETP. This setup is required for an ETP implementation.
  • Selective Proxy. This configuration of ETP Proxy scans risky web traffic. For more information about the selective proxy, see Selective proxy.
  • Full Web Proxy. This configuration of ETP Proxy scans all web traffic. For more information about the full web proxy, see Full web proxy.
  • Identity Providers. An identity provider (IdP) is a service that creates, manages, and saves user identity information. Identity providers are required for implementing user authentication. For more information, see Identity providers. To learn more about user authentication in ETP, see User authentication and group policies.
The setup workflow is available at the top of the Enterprise Center interface when you click the wand icon. You can access this workflow at any time to guide you through the process.
The workflow is divided into these setup procedures:
  1. DNS Security Setup
  2. Selective Proxy Setup
  3. Full Proxy Setup
  4. Identity Provider Setup

The steps and the order of steps in each setup procedure are recommended. After you complete a step and a setup procedure, steps in the workflow change from blue to green.

You can click a specific step in a workflow to direct you to the interface page where you can configure the corresponding feature. For example, clicking on Policies in the workflow directs you to the Policies page where you can add a policy.