Set up Enterprise Threat Protector
- DNS Security. Provides steps to quickly get started with ETP. This setup is required for an ETP implementation.
- Selective Proxy. This configuration of ETP Proxy scans risky web traffic. For more information about the selective proxy, see Selective proxy.
- Full Web Proxy. This configuration of ETP Proxy scans all web traffic. For more information about the full web proxy, see Full web proxy.
- Identity Providers. An identity provider (IdP) is a service that creates, manages, and saves user identity information. Identity providers are required for implementing user authentication. For more information, see Identity providers. To learn more about user authentication in ETP, see User authentication and group policies.
- DNS Security Setup
- Selective Proxy Setup
- Full Proxy Setup
- Identity Provider Setup
The steps and the order of steps in each setup procedure are recommended. After you complete a step and a setup procedure, steps in the workflow change from blue to green.
You can click a specific step in a workflow to direct you to the interface page where you can configure the corresponding feature. For example, clicking on Policies in the workflow directs you to the Policies page where you can add a policy.