Glossary of SonicWall's Cloud Secure Edge (CSE) Terms

Terminology SonicWall uses to represent and secure users, devices, or applications running in any type of environment

  • Updated on May 16, 2024



An Organization is a company, or company division, that has an account on the Command Center.


A User is a human being who has a relationship with your Organization. They may be an employee, customer, contractor, partner, etc.


Users belong to one or more Groups within an Organization. There can be a large number of Users in any Organization with different changing properties. Groups, on the other hand, are much fewer in number and more permanent in their classifications.

Identity Provider

An Identity Provider (IDP) creates, maintains, and manages identity information for Users in your Organization. It delivers authentication capabilities to reliant applications, such as the Command Center. Popular IDP providers include Okta, Google Identity, and Azure Active Directory.


A Device is an electronic appliance, such as personal computer, mobile phone, or tablet computer, capable of connecting to a network and processing data. A Device is used by Users to make requests to access protected resources. Devices do not need to be in your Organization’s private network.

Device Manager

An Enterprise Device Manager (abbreviated EDM, and sometimes referred to as MDM or UEM) enables IT administrators to control, secure, and enforce policies on smartphones, tablets, laptops and desktop computers. Popular EDM products include Workspace ONE UEM, JAMF, and Citrix.



A Cluster is a logical grouping of Access Tiers that are managed together for a given Organization. A Cluster includes a Private PKI (Public Key Infrastructure) to distribute cryptographic identities (X.509 Certificates) to clients and services in your organization.

Access Tier

An Access Tier is an identity-aware proxy and gateway that mediates access into a private network segment within which corporate applications and services run. An Access Tier has a public IP address that is reachable from the internet.


A Connector is a Dial-out Connector that runs in a private network segment within which your corporate applications and services run. A Connector establishes a secure tunnel with one or more Access Tiers.



In SonicWall’s Cloud Secure Edge, a Service provides secure connectivity to corporate resources. Once a Service is registered in the Command Center, access controls can be enforced using an Access Tier. Policies, which enforce access controls, are attached to Services.

SaaS Application

A SaaS app is a special type of Service that is not hosted in a customer environment. Instead, SaaS apps are hosted by the SaaS vendor, in the vendor’s data centers. SaaS application traffic does not flow though an Access Tier; instead, SonicWall has a special enforcement called IDP Chaining for SaaS applications.

Roles & Policies


In SonicWall, a Role represents a set of access privileges. The specific access privileges of a Role are determined by the Policies that mention the Role.

Roles are assigned to Users based on attributes we’ve gathered during the authentication phase.


In SonicWall, a Policy is set of authorization rules that specify which Users can access a given Service.

Note that we write Policies using Roles and not individual Users; Roles simplify policy creation by grouping Users with similar access privileges.

Device Trust Scoring

Trust Scoring

The calculation of a device’s Trust Level by evaluating the Effect of each Trust Factor.

Trust Factor

An attribute (visible to end users on their devices) that is evaluated against admin-defined criteria, used as input in the device Trust Scoring calculation.


The weight assigned to each particular Trust Factor (i.e., Low Trust Level, Medium Trust Level, Always Deny, No Effect, Not Evaluated).

Example: An admin assigns a Low Trust Level Effect to the Trust Factor, Firewall Enabled. If the firewall is not enabled on the device, the device’s Trust Level will drop to Low. If the firewall is enabled on the device, the Trust Factor is satisfied and there is no negative impact on the device’s Trust Level.

  • Always Deny: If this factor is not satisfied, the device will be denied authorization into all protected services.

  • Not Evaluated: This factor will not be used in the Trust Level calculation, and it will not be displayed in the app.

  • Low Trust Level: If this factor is not satisfied, the device’s Trust Level will be set to low.

  • Medium Trust Level: If this factor is not satisfied, the device’s Trust level will be set to medium.

  • No Effect: If this factor is not satisfied, it will have no effect on the device’s Trust Level, but will be displayed in the app. | This is primarily used for testing purposes.

Trust Profile

A profile in the Command Center that applies admin-defined Trust Factors to a specific subset of devices within an org. Trust Profiles allow admins to assign a specific set of Trust Factors (with designated Trust Effects) to custom user groups, device serial numbers, and operating systems.

Granular Trust Scoring

A feature that allows Trust Factors to be assigned an Effect, used to evaluate admin-defined groups of registered devices. This feature was designed to give admins more fine-tuned control over the Trust Scoring process.

Internet Threat Protection

Internet Threat Protection (ITP)

A feature that allows SonicWall’s Cloud Secure Edge to evaluate which URLs (being searched by end users) pose a threat and need to be blocked from access. The URLs are mapped to content categories, providing further content filtering against the URL.

Internet Threat Protection (ITP) Policy

A policy page in the Command Center that applies admin-defined configurations of threats and URLs to block on a specific subset of devices (via roles within an org).

Block Page

An admin-configured webpage that presents itself when an end user attempts to reach a URL that is not permitted via the ITP Policy associated with the device.

Threat Protection

A section within the ITP Policy page, in which an admin can block threats from end users’ reach. Threats are placed in categories such as Malware, Phishing, Spyware, New Domains, Proxy & Tunnel Avoidance, etc.

Content Filtering

A section within the ITP Policy page, in which an admin can block categories of domains and specific URLs from end users’ reach. Domain categories include Dating & Personals, Drugs, Social Networking, etc.

Can’t find what you’re looking for?

We’re happy to help. Contact our team.