Plan and Prepare for Malware Protection
This procedure is the first set of steps in the complete process for configuring your system to provide malware protection.
Procedure
Step 1 | Purchase and install licenses. |
Step 2 | Understand how file policies and malware protection fit into your access control plan. See the chapter Access Control Overview. |
Step 3 | Understand the file analysis and malware protection tools. See File Rule Actions and subtopics. Consider also Advanced and Archive File Inspection Options. |
Step 4 | Determine whether you will use public clouds or private (on-premises) clouds for malware protection (file analysis and dynamic analysis.) See Cloud Connections for Malware Protection and subtopics. |
Step 5 | If you will use private (on-premises) clouds for malware protection: Purchase, deploy, and test those products. For information, contact your Cisco sales representative or authorized reseller. |
Step 6 | Configure your firewall to allow communications with your chosen clouds. |
Step 7 | Configure connections between Firepower and the malware protection clouds (public or private, as applicable). |
What to do next
Continue with the next step in the malware protection workflow: