How to Configure Malware Protection
This topic summarizes the steps you must take to set up your system to protect your network from malicious software.
Procedure
1 | |
2 | |
3 | |
4 |
Configure network discovery policies to associate file and malware events with hosts on your network. (Do not simply turn on network discovery; you must configure it to discover hosts on your network to build a network map of your organization.) See Network Discovery Policies and subtopics. |
5 |
Deploy policies to managed devices. |
6 |
Test your system to be sure it is processing malicious files as you expect it to. |
7 |
What to do next
-
(Optional) To further enhance detection of malware in your network, deploy and integrate Cisco's Secure Endpoint product. See (Optional) Malware Protection with Secure Endpoint and subtopics.