Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

Policy Enforcer Settings

To access this page, in the Security Director UI, navigate to Administration > Policy Enforcer > Settings.

Before You Begin

Before You Begin

Procedure

To set up a Sky ATP Configuration Type, you must do the following:

  1. Enter the IP address for the policy enforcer virtual machine. (This is the IP address you configured during the PE VM installation. You can locate this IP address in the vSphere Center portal.)
  2. Enter the password for the policy enforcer virtual machine. (This is the same password you use to login to the VM with your root credentials. Note that the username defaults to root )

    Note: Refer to Deploying and Configuring the Policy Enforcer with OVA files for instructions on downloading Policy Enforcer and creating your policy enforcer virtual machine.

  3. Select a Sky ATP Configuration Type. If you do not select a type, Policy Enforcer works in default mode. (SeeSky ATP Configuration Type Overview for more information.)
    • Sky ATP with SDSN—All Policy Enforcer features and threat prevention types are available.

      Note: If you upgrade from cloud feeds or Sky ATP, you cannot roll back again. Upgrading resets all devices previously participating in threat prevention. Use guided setup to expedite the process configuring threat prevention policies.

      See the following topics to configure Sky ATP with SDSN:

    • Sky ATP—All threat prevention types are available: Command and control server, Geo IP, and Infected hosts.

      Note: If you upgrade from cloud feeds only to Sky ATP, you cannot roll back again. Upgrading resets all devices previously participating in threat prevention, and you must re-enroll them with Sky ATP. Use the setup wizard to expedite the process configuring threat prevention policies.

      See the following topics to configure Sky ATP:

    • Cloud feeds only—Command and control server, infected hosts, and Geo IP are the threat prevention types available.

      See the following topic to configure Cloud feeds only:

    • No Selection—Custom feeds only. Infected hosts is the prevention type available.

      See the following topic to configure “no selection”:

  4. Polling timers affect how often the system polls to discover endpoints. There are two polling timers, one that polls network wide and one that polls site wide. They each have default settings, but you can change those defaults to poll more or less often.
    • Network wide polling interval (value in hours): The default is 24 hours. You can set this range from between 1 to 48 hours. This timer polls all endpoints added to the secure fabric.

    • Site wide polling interval (value in minutes): The default is 5 minutes. You can set this range from 1 minute to 60 minutes. This timer polls infected endpoints moving within the sites that are a part of Secure fabric.

  5. Click the Download button to view or save Policy Enforcer data logs to your local system. These logs are in a compressed file format.

Related Documentation

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit