Check Devices' Security Posture

Use Cloud Secure Edge to provide users in your org with granular access to protected services

  • Updated on Oct 29, 2024

Step 1: Learn about Trust Profiles #

1.1 Follow the steps outlined on the Trust Profile doc to learn about how Trust Profiles function.

Step 2: Create a Trust Profile for a Set of User Roles using a Trust Factor #

2.1 Use any implementation of a Trust Profile configuration (e.g., the Application Check Trust Factor) as a template for how to configure a Trust Profile to check your devices’ security posture.