Onboard a Threat Defense Device
There are various ways to onboard a threat defense device for management. See the following use cases for what best meets your environment:
Threat Defense Devices Managed by Cloud-delivered Firewall Management Center
Devices that are to be managed by the cloud-delivered Firewall Management Center can be brand new, reimaged, or currently managed by another managing platform. For onboarding prcoedures, see the Onboarding Overview for cloud-delivered Firewall Management Center.
Threat Defense Devices Managed by Firewall Device Manager
Threat Defense devices that are currently configured for firewall device manager management, or will be managed by this platform in the future, can be onboarded to CDO in a multitude of ways. See Onboard a Threat Defense Device for more information.
Threat Defense Devices Managed by On-Prem Firewall Management Center
Devices that are managed by the on-prem management center are not actually onboarded to CDO directly; when you onboard the on-prem management center, all of the devices that are managed by that platform are onboarded by association and are nested under the "FMC" device entry in the Inventory page. See Onboard an On-Prem Management Center to CDO for more information.