Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco Secure Endpoint
(AMP for Endpoints) Set Up

Get the most out of your security solution.

Your Endpoint Protection Journey

We gathered all the resources you'll need to successfully set up, install, and use your Secure Endpoint solution.

Onboard

Get to know your product, understand its features, and begin to gather information about your environment. Follow the steps below to ensure a successful start to your Secure Endpoint deployment. 

Success measures

Ready to move on? Check that you have completed these tasks.

Before moving on, make sure you: 

  • Learned about your Secure Endpoint  
  • Gathered information about your deployment environment  
  • Planned for and began your alpha deployment  
  • Created policies to prepare for connectors  
  • Set up roles and groups for connectors  
  • Established exclusions and configured connectors

If you completed these tasks, you are ready for the next steps. If you haven't, go back and make sure each item is complete to ensure successful deployment, installation, and future use of your product.

Need help? Check out deployment support for additional resources. 

Implement

Complete alpha deployment and deploy and tune your connectors.

Success measures

Ready to move on? Check that you have completed these tasks.

Before moving on, make sure you:

  • Set up and deployed your connectors
  • Tuned your connectors
  • Completed alpha deployment

If you completed these tasks, you are ready for the next steps. If you haven't, go back and make sure each item is complete to ensure successful deployment, installation, and future use of your product. 

Need help? Check out deployment support for additional resources.

Use

Expand to beta deployment, incorporate additional features, convert connectors from audit to protect mode, and continuing connector deployment. By this stage, you should be logging into your console regularly.

Success measures

Ready to move on? Check that you have completed these tasks.

Before moving on, make sure you: 

  • Activated connectors. 
  • Expanded to beta deployment. 
  • Incorporated base features. 
  • Incorporated additional features. 
  • Began to log in to the console regularly. 
  • Converted connectors from audit to protect mode. 
  • Continued connector deployment.

If you completed these tasks, you are ready for the next steps. If you haven't, go back and make sure each item is complete to ensure successful deployment, installation, and future use of your product. 

Need help? Check out deployment support for additional resources. 

Engage

Expand to general deployment, incorporate advanced features, integrate Secure Malware Analytics (formerly Threat Grid), and continue moving connectors to protect mode. Make sure you are logging into your console regularly. 

Success measures

Ready to move on? Check that you have completed these tasks.

Before moving on, make sure you: 

  • Expanded to general deployment 
  • Integrated Secure Malware Analytics
  • Incorporated advanced features 
  • Continued connector deployment 
  • Log in to the console regularly

If you completed these tasks, you are ready for the next steps. If you haven't, go back and make sure each item is complete to ensure successful deployment, installation, and future use of your product. 

Need help? Check out deployment support for additional resources. 

Adopt

Continue connector deployment, leverage Cisco Orbital and Cisco SecureX features, manage information and threats, create reports, and continue moving connectors to protect mode. Keep logging into your console regularly.

Success measures

Ready to move on? Check that you have completed these tasks.

Before moving on, make sure you: 

  • Integrated SecureX 
  • Integrated Orbital 
  • Managed information and create reports 
  • Continued moving connectors toward protect mode 
  • Log in to the console regularly

If you completed these tasks, you are ready for the next steps. If you haven't, go back and make sure each item is complete to ensure successful deployment, installation, and future use of your product. 

Need help? Check out deployment support for additional resources. 

Secure Endpoint integrations

Cisco Secure account

Activate your account to manage multiple applications within the Cisco Secure portfolio from one single destination.

Cisco Secure Malware Analytics

Quickly recover from and proactively defend against attacks across your security infrastructure.

Third-party integration for Secure Endpoint

Integrate seamlessly with other security technologies so you can respond to threats confidently.

Cisco Orbital

Simplify security investigation and threat hunting by quickly running complex queries on any or all endpoints.

SecureX

As a Secure Endpoint customer, you’re entitled to Cisco SecureX, our integrated platform solution. With SecureX you can radically reduce threat dwell time and human-powered tasks to stay compliant and counter attacks. Simply log in with your Cisco credentials to get started.

Secure Endpoint live events

Monthly webinars

Join us for monthly Secure Endpoint workshops. Tune in for live teaching focused on best practices, FAQs, and proven tips and tricks.

Ask the experts

For a limited time only, Secure Endpoint "Ask the Experts" sessions are free. Don't miss out on real-time learning from the experts.

Engage and connect

Join Cisco Community for Secure Endpoint

The Cisco community offers a vibrant peer-to-peer network focused on Cisco Secure Endpoint. Join today for quick tips and expert answers.