Enable ThreatSync

Applies To: ThreatSync

You do not have to purchase a new license to enable and use ThreatSync, but you must enable it in your account to use it. When you enable ThreatSync, it is automatically enabled on the Fireboxes, access points, and endpoint devices allocated to the account. These devices automatically send data to ThreatSync.

Before you begin, make sure that you meet the requirements for each product you want to use with ThreatSync. For more information, go to ThreatSync Requirements.

Enable ThreatSync in Your Account

To enable ThreatSync for your account, in WatchGuard Cloud:

  1. From Account Manager, select your account.
  2. Select Monitor > Threats or Configure > ThreatSync.

Screen shot of the Enable ThreatSync widget

  1. In the ThreatSync tile, click Enable ThreatSync.
    The Enable ThreatSync dialog box opens. ThreatSync is automatically enabled on any devices in your account.

Screen shot of the Enable ThreatSync dialog box

  1. Click Close.
    The Device Settings page opens.

Manually Enable ThreatSync on a Device

When you enable ThreatSync for an account, it is automatically enabled on the Fireboxes, access points, and endpoint devices allocated to the account. You can manage which products and devices send data to ThreatSync from the Device Settings page. For more information, go to Configure Device Settings in ThreatSync.

You can also manually enable or disable ThreatSync at the device level.

To enable or disable ThreatSync on a Firebox, at the device level:

  1. Select Configure > Devices.
  2. Select the Firebox.
  3. In the ThreatSync section, disable ThreatSync.

    Screen shot of the ThreatSync toggle on the Device Settings page in WatchGuard Cloud

To enable or disable ThreatSync on an access point, at the device level:

  1. Select Configure > Devices.
  2. Select the access point.
  3. In the ThreatSync section, disable ThreatSync.

    Screenshot of the ThreatSync toggle on the Device Settings page in for an Access Point in WatchGuard Cloud

Related Topics

Configure ThreatSync

Configure Device Settings in ThreatSync

Review Incident Details in ThreatSync

About ThreatSync Automation Policies

Access Point Airspace Monitoring