Step 2 – Configure Access to Resources
The Get Started with Secure Access workflow guides you through the tasks in the Secure Resources and Access step—secure your private resources, enable access controls on resources, and create policy rules. For more information, see Manage Private Resources.
Table of Contents
- Prerequisites
- Task 1 – Set Up Private Resources
- Task 2 – Configure Rule Defaults and Global Settings
- Task 3 – Add a Policy Rule
- What's Next
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
Task 1 – Set Up Private Resources
Configure access to private resources for your users. Private resources are private subnets (IPv4 routes) and applications deployed and managed by your organization.
Task 2 – Configure Rule Defaults and Global Settings
Set up Secure Access rule defaults and global settings to access private resources.
Manage Rule Defaults
- Manage IPS Profiles
- Manage Security Profiles
- Manage Zero Trust Access Posture Profiles
- Manage VPN Connection Posture Profiles
- Manage Tenant Controls
- Manage Certificates
- Manage Threat Categories
Manage Global Settings
Manage the settings that apply to all policy rules. The Secure Access policy has both global and default settings.
Global Settings:
Default Settings:
Task 3 – Add a Policy Rule
Configure and add rules to the Secure Access policy.
What's Next
Step 1 – Configure Network Connections < Step 2 – Configure Access to Resources > Step 3 – Configure End User Connectivity
Updated 3 months ago