Check Devices' Security Posture
Use Cloud Secure Edge to provide users in your org with granular access to protected services
- Updated on Oct 29, 2024
Step 1: Learn about Trust Profiles
1.1 Follow the steps outlined on the Trust Profile doc to learn about how Trust Profiles function.
Step 2: Create a Trust Profile for a Set of User Roles using a Trust Factor
2.1 Use any implementation of a Trust Profile configuration (e.g., the Application Check Trust Factor) as a template for how to configure a Trust Profile to check your devices’ security posture.
Can’t find what you’re looking for?
We’re happy to help. Contact our team.