ADMINISTRATION PORTAL
Help Center User GuideGetting StartedFAQsRelease Notes
 
X
User Guide
Getting Started
FAQs
Release Notes

Using Guided Setup for Sky ATP with SDSN

See Policy Enforcer Overview for product information.

If you are using Policy Enforcer for threat prevention with Sky ATP, Guided Setup is the most efficient way to complete your initial configuration. If you are using Sky ATP without PE, you should use Sky ATP Guided Setup. See Using Guided Setup for Sky ATP.

Note: Before you configure Policy Enforcer, you must enter the IP address and login credentials for the policy enforcer virtual machine. Go to Administration > Policy Enforcer > Settings. Once this information is entered, you can begin the setup process. See Policy Enforcer Settings. (Refer to Policy Enforcer Installation Overview for instructions on downloading Policy Enforcer and creating your policy enforcer virtual machine.)

Note: A Sky ATP license and account are needed for all threat prevention types (Sky ATP with SDSN, Sky ATP, and Cloud Feeds only). If you do not have a Sky ATP license, contact your local sales office or Juniper Networks partner to place an order for a Sky ATP premium or basic license. If you do not have a Sky ATP account, when you configure Sky ATP, you are redirected to the Sky ATP server to create one. Please obtain a license before you try to create a Sky ATP account. Refer to Obtaining a Sky ATP License for instructions on obtaining a Sky ATP license.

Guided Setup is located under Configure>Guided Setup.

The Guided Setup process offers four steps for configuring Sky ATP with SDSN. Click Start Setup to begin.

Procedure

  1. Secure Fabric—Secure Fabric is a collection of network devices (switches, routers, firewalls, and other security devices), used by users or user groups, to which policies for aggregated threat prevention are applied. Once created, secure fabric is located under Devices. For secure fabric, the following is configured:
    • Sites—A site is a collection of network devices participating in threat prevention. Using quick setup, you can create your own site, but note that a device can only belong to one site and you must remove it from the any other site where it is used to use it elsewhere.

      Click Add Devices in the Device Name column or in the IP address column to add devices to a site. Using the check boxes in the device list, you should indicate which devices are firewalls or switches. Policy Enforcer needs to know which devices are firewalls so they can be enrolled in Sky ATP realms and receive feed downloads.

      Note: Firewall devices are automatically enrolled with Sky ATP as part of this step. No manual enrollment is required.

  2. Policy Enforcement Group—A policy enforcement group is a grouping of endpoints ready to receive advance threat prevention policies. Create a policy enforcement group by adding endpoints (firewalls and switches) under one common group name and later applying a security policy to that group. For policy enforcement group, the following is configured:
    • Once configured, policy enforcement groups are located under Configure > Shared Objects. A policy enforcement groups has the following fields:
      • Name and Description.
      • Group Type—IP Address, Subnet, or Location
      • Endpoint—IP addresses included in the group
  3. Sky ATP Realm— If you have not created a realm from within your Sky ATP account, you can create and register it here by clicking the + sign. Once you register a realm, you can enroll SRX Series devices into the realm. A security realm is a group identifier for an organization used to restrict access to Web applications. You can create one or multiple realms. A realm has the following configuration fields
    • Username and Password—These are credentials you must provide, obtained through your Sky ATP account.
    • Realm—This is the name of the realm you are creating.
  4. Threat Prevention Policy—A threat prevention policy requires you to create a name for the policy, choose one or more profile types depending on the type of threat prevention this policy provides (C&C Server, Infected Host, Malware), and select a log setting. Once configured, you apply policies to policy enforcement groups.
    • Once configured, threat prevention policies are located under Configure > Threat Prevention > Policies. A policy has the following fields:
      • Name and Description.
      • Profiles—The type of threat this policy manages:
        • C&C Server (Command and Control Server)—A C&C server is a centralized computer that issues commands to botnets (compromised networks of computers) and receives reports back from them. A C&C profile would provide information on C&C servers that have attempted to contact and compromise hosts on your network. Information such as IP address, threat level, and country of origin are gathered.
        • Infected Host—An infected host profile would provide information on compromised hosts and their associated threat levels. Host information includes IP address, threat level, blocked status, when the threat was seen, command and control hits, and malware detections.
        • Malware—A malware profile would provide information on files downloaded by hosts and found to be suspicious based on known signatures or URLs. The filename, file type, signature, date and time of download, download host, URL, and file verdict are gathered.
      • Logging—All traffic is logged by default. Use the pulldown to narrow the types of traffic to be logged.
    • Group—Once your policy is created, it is applied to the policy enforcement group.
  5. The last page is a summary of the items you have configured using quick setup. Click OK to be taken to the Policies page under Configure > Threat Prevention > Policies and your policy is listed there.
  6. You must update to apply your new or edited policy configuration. Clicking the Ready to Update link takes you the Threat Policy Analysis page. See Threat Policy Analysis Overview. From there you can view your changes and choose to Update now, Update later, or Save them in draft form without updating.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!
  • Policy Enforcer Configuration Concepts
  • Policy Enforcer Settings
  • Configuring Sky ATP with SDSN (Without Guided Setup) Overview
  • Using Guided Setup for Sky ATP

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit