Check Devices' Security Posture

Use Cloud Secure Edge to provide users in your org with granular access to protected services

  • Updated on Oct 29, 2024

Step 1: Learn about Trust Profiles

1.1 Follow the steps outlined on the Trust Profile doc to learn about how Trust Profiles function.

Step 2: Create a Trust Profile for a Set of User Roles using a Trust Factor

2.1 Use any implementation of a Trust Profile configuration (e.g., the Application Check Trust Factor) as a template for how to configure a Trust Profile to check your devices’ security posture.


Can’t find what you’re looking for?

We’re happy to help. Contact our team.