Configure Threat Defense Virtual Clustering To configure clustering after you deploy your threat defense virtuals, perform the following tasks. Add Devices to the Management CenterCreate a ClusterConfigure InterfacesConfigure Cluster Health Monitor Settings