Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Plan and Prepare for Malware Protection

This procedure is the first set of steps in the complete process for configuring your system to provide malware protection.

Procedure

1

Purchase and install licenses.

2

Understand how file policies and malware protection fit into your access control plan.

See the chapter Access Control Overview.

3

Understand the file analysis and malware protection tools.

4

Determine whether you will use public clouds or private (on-premises) clouds for malware protection (file analysis and dynamic analysis.)

5

If you will use private (on-premises) clouds for malware protection: Purchase, deploy, and test those products.

For information, contact your Cisco sales representative or authorized reseller.

6

Configure your firewall to allow communications with your chosen clouds.

7

Configure connections between Firepower and the malware protection clouds (public or private, as applicable).

    What to do next

    Continue with the next step in the malware protection workflow:

    See How to Configure Malware Protection.