Breadcrumbs

Getting Started with Enforce

Welcome to threatER Enforce! Whether you’re new to Enforce or need a refresher, this guide will walk you through the steps to configure and deploy our Enforce software. For those just exploring, Enforce is an advanced network security solution designed to protect your infrastructure by blocking threats. It integrates seamlessly into your environment, leveraging advanced threat intelligence to keep your network secure.

When you’re ready to begin, follow these steps to deploy and configure threatER Enforce in your network.


Overview

Enforce is easily installed on a network appliance (the “Enforcer”) deployed in your security stack, most often between your ISP and the rest of your network. To enable and manage Enforce, you will need to activate your Enforcer in the Enforce portal, configure the software and create your policies and networks to manage your enforcement posture.

Onboarding in 7 Steps

  1. Choosing the Right Deployment Option - Choose your preferred deployment method — ready-to-configure physical hardware, self-procured physical hardware, cloud/virtual infrastructure or Wi-Fi. This ensures your Enforcer is set up and ready for network integration.

  2. Activate your Enforcer - Assign a non-routable IP address within your network for the Admin Interface and activate your Enforcer in the threatER Portal. This step allows Enforce to reach the internet from within your network and links your Enforcer to the portal, enabling you to complete the software configuration.

  3. Review Settings in Enforce UI - Review the local Enforce settings and change the passwords for your local Enforcer user account and the command line credentials.

  4. Configure Enforce Software - Adjust network and system settings to tailor Enforce to your environment. This includes setting user access controls, establishing baseline policies, and ensuring compatibility with your infrastructure.

  5. Set Up Enforce Policies - Define and manage lists and rules to identify and block potential threats effectively. This step builds your first layer of network defense.

  6. Deploying with Allow All Policy - Deploy your Enforcer in an "Allow All" posture. Use this phase to validate your configurations and ensure they meet your needs before moving to a blocking posture.

  7. Transitioning to Blocking Posture - Move Enforce to active blocking posture. This step ensures Enforce is managing live traffic and applying your policy rules. Continue to review logs, analyze traffic and refine configurations to adapt to evolving threats and ensure optimal performance.

Ready to Begin?

Each step is accompanied by detailed articles and resources to guide you through the process. For additional support, reach out to our support team for assistance. Secure your network today with threatER! Click below to start your journey:

Proceed to Step 1 – Choosing the Right Deployment Option