Manage Zero Trust Access Posture Profiles

These profiles specify end-user device requirements when connecting to private resources using Zero Trust Access.

There are two types of profiles to choose from:

Client-based access permits more posture requirements than clientless access, so you should tailor profiles to the type of access.

Zero Trust Access Posture Attributes

  • Supported operating systems
  • Firewall
  • Endpoint security agents
  • System password
  • Disk encryption
  • Browser

Manage Endpoint Security < Manage Zero Trust Access Posture Profiles > Add a Client-based Zero Trust Access Posture Profile