Plan and Prepare for Malware Protection
This procedure is the first set of steps in the complete process for configuring your system to provide malware protection.
Procedure
1 |
Purchase and install licenses. |
2 |
Understand how file policies and malware protection fit into your access control plan. See the chapter Access Control Overview. |
3 |
Understand the file analysis and malware protection tools. See File Rule Actions and subtopics. Consider also Advanced and Archive File Inspection Options. |
4 |
Determine whether you will use public clouds or private (on-premises) clouds for malware protection (file analysis and dynamic analysis.) See Cloud Connections for Malware Protection and subtopics. |
5 |
If you will use private (on-premises) clouds for malware protection: Purchase, deploy, and test those products. For information, contact your Cisco sales representative or authorized reseller. |
6 |
Configure your firewall to allow communications with your chosen clouds. |
7 |
Configure connections between Firepower and the malware protection clouds (public or private, as applicable). |
What to do next
Continue with the next step in the malware protection workflow: