Plan and Prepare for Malware Protection

This procedure is the first set of steps in the complete process for configuring your system to provide malware protection.

Procedure


Step 1

Purchase and install licenses.

Step 2

Understand how file policies and malware protection fit into your access control plan.

See the chapter Access Control Overview.

Step 3

Understand the file analysis and malware protection tools.

Step 4

Determine whether you will use public clouds or private (on-premises) clouds for malware protection (file analysis and dynamic analysis.)

Step 5

If you will use private (on-premises) clouds for malware protection: Purchase, deploy, and test those products.

For information, contact your Cisco sales representative or authorized reseller.

Step 6

Configure your firewall to allow communications with your chosen clouds.

Step 7

Configure connections between Firepower and the malware protection clouds (public or private, as applicable).


What to do next

Continue with the next step in the malware protection workflow:

See How to Configure Malware Protection.