Configure Policies to Support Threat Intelligence Director
You must configure access control policies to publish threat intelligence director data from the management center to your managed devices (elements). In addition, we recommend that you configure your access control policies to maximize observation and management center event generation.
For each managed device that you want to support threat intelligence director, perform the steps below to configure the associated access control policy.
Elements that are configured to use threat intelligence director after data has been published will automatically receive all currently-published observables.
Procedure
Step 1 | Verify that the Enable Threat Intelligence Director check box is checked in General Settings of the access control policy. To navigate to General Settings, choose . This option is enabled by default. For more information, see Access Control Policy Advanced Settings. |
Step 2 | Add rules that allow (rather than trust) connections to the access control policy if they are not already present. Threat Intelligence Director requires that the access control policy specify at least one rule. Because threat intelligence director depends on inspection, ensure that you allow traffic, rather than trust it, because the purpose of trusting traffic is to bypass inspection. For more information, see Creating a Basic Access Control Policy. |
Step 3 | If you choose Intrusion Prevention as the default action for the access control policy and you want to decrypt traffic for TID detection, associate an SSL policy with the access control policy; see Associating Other Policies with Access Control. |
Step 4 | If you want |
Step 5 | If you want |
Step 6 | Deploy configuration changes. |