The Secure Access Rules screen provides you an overview of the secure access rules that you have created to mitigate different risks across your network environment.
Before creating a secure access rule, grant the following permissions or complete
the following
configurations:
-
Configure your IAM related settings to allow Trend Vision One to access user data, authenticate users, and take access control actions on your IAM system. For more information, see Supported IAM systems and required permissions.
-
Deploy the private access service to secure access to your organization's internal apps. For more information, see Private Access configuration.
-
Deploy the internet access service to protect your users against risks and threats when they visit cloud apps and external URLs. For more information, see Internet Access and AI Service Access configuration.
Action
|
Description
|
Create a secure access rule
|
Secure access rules control the way users can access and use your organization's network
environment. The rules enable you to respond to risky behavior or suspicious entities
and
activities in your environment, so that you can perform dynamic control over access
to
internal and cloud applications by risk, identity, time, and location.
For more information about creating secure access rules, see Modifying a risk control rule in classic view, Creating a private access rule
and Creating an internet access rule.
|
Check secure access rule details
|
Click the Risk Control, Private Access Control
or Internet Access Control tab to view all the configured rules for
your organization.
Click a rule name to edit the rule as needed.
|
Change the secure access rule status
|
Click the toggle under Status to enable or disable a rule.
|
Copy or delete a rule
|
|
Prioritize secure access rules
|
Rules are applied in order from the highest priority to lowest priority.
|
Filter secure access rules
|
|