- Register your Threatpulse Portal Account
- The first step in configuring your Threatpulse Portal is to register your Primary Administrator user.
- Following the document below, you'll be provided with steps to register your initial user for your Threatpulse account:
- https://support.symantec.com/en_US/article.TECH249536.html
- Import Policy
- Once you've registered your Primary Administrator, you'll be brought to the configuration page.
- Should you choose to do so, you will be allowed the option to Import your policy into WSS right away.
- Following the documentation below, you'll be provided with steps to import your existing policy, either During Registration or Post-Registration:
- http://portal.threatpulse.com/docs/sol/AccessMethods/deploy/webcloud/webcloud_landing.htm
- Setup User Accounts
- Once you have move beyond the initial configuration page, you now have access to the rest of your Threatpulse Portal.
- A common next step is to configure additional users to access and/or administer your Threatpulse account.
- Utilizing the documentation below, you can add users to any of the following roles: Administrator, Report User or Reviewer:
- http://portal.threatpulse.com/docs/sol/Solutions/Admin/UserMgmt/adm_addadmin_ta.htm
- Setup Network Locations
- During the import of your Web.Cloud Policy, you are given the option to migrate static addresses for web routes.
- In WSS these are labeled as Locations.
- You have the ability to configure multiple varieties of Locations within Threatpulse.
- The documentation below provides a walkthrough on the configuration and deployment of these Location types:
- Firewall/VPN: https://portal.threatpulse.com/docs/am/AccessMethods/deploy/onpremise/firewallvpn/fwvpn_select.htm
- Proxy Forwarding: https://portal.threatpulse.com/docs/am/AccessMethods/deploy/onpremise/proxy/prxy_select_ta.htm
- Explicit Proxy: https://portal.threatpulse.com/docs/am/AccessMethods/deploy/explicit/explicit_select.htm
- Setup User Authentication
- Once your policy is imported, you may want to add the functionality of user and group based authentication.
- The documentation below provides a matrix for selecting the proper Authentication Method (based on Access Method), and how to configure each Auth Method:
- https://portal.threatpulse.com/docs/am/AccessMethods/Concepts/AuthDetail/about_authentication_co.htm
- Configuring SSL Interception
- Once your locations, policy and authentication are setup, the next logical (and major) configuration will be for SSL Interception.
- Enabling SSL Interception allows WSS to perform policy checks, examine contents and to decrypt HTTPS connections.
- The following documentation provides information on how SSL Interception works, how to configure and enable interception, and includes ways to troubleshoot the service:
- https://portal.threatpulse.com/docs/am/Solutions/ManagePolicy/SSL/about_ssl_co.htm
Once you've completed these tasks, you should have a fully functioning, policy enforcing environment.
In the event that you have questions about any of the individual tasks above, please contact Symantec Network Protection Support.