
Mitigation Settings > Data Sources
Threat Discovery Appliance is the device that monitors the network. Threat Mitigator works with this device to improve scanning and provide cleaning and blocking features.
Note: Enable Threat Mitigator from the Threat Discovery Appliance product console and not from the Threat Mitigator product console.
Go to the Threat Discovery Appliance product console.
Click Mitigation on the main menu. The drop-down menu displays.
Click Mitigation Settings from the drop-down menu. The Mitigation Settings screen appears.
Click Enable beside Mitigation Device Enforcement.
Type the Threat Mitigator server name or IP address, and description.
Specify the IP address ranges that will receive mitigation tasks from Threat Discovery Appliance.
Note: To save network bandwidth, define specific IP addresses for Threat Mitigator. Threat Discovery Appliance only sends mitigation tasks for these specific IP addresses to Threat Mitigator. If the IP address range remains empty, all mitigation requests will be sent to Threat Mitigator.
Click Register. The Cleanup Settings screen appears.
(Optional) Select the Types of Security Risks/Threats to send to Threat Mitigator.
Click Apply.