Deploying the Secure Access Module to Endpoints

Authenticate user access attempts at the account and device levels using the Secure Access Module.

Installed on end-user devices and integrated with your IAM solution, the Secure Access Module transfers connection attempts to configured Private Access Connectors or Internet Access Gateways that enforce Private Access and Internet Access rules.
  1. On the Trend Micro Vision One console, go to Zero Trust Secure Access > Secure Access Configuration > Secure Access Module and click the Available Endpoints tab.
    Note:

    The Available Endpoints list only displays endpoints that have the agent program installed.

  2. (Optional) Download and install the agent program on additional devices by clicking Download the Agent Installer.

    For more information, see deploying the agent and Secure Access Module system requirements.

  3. (Optional) Filter the endpoints that display in the list by selecting Endpoints with no module deployed.
  4. Select the endpoint that you want the Secure Access Module deployed to.
    1. Select one or more endpoints not yet deployed with the Module and click Deploy Module.
    2. On the Deploy Secure Access Module screen that appears, confirm the selected endpoints and click Deploy.

      You can monitor the deployment status on the Available Endpoints tab. If an error occurs during deployment, click the Action required tab for detailed information.

  5. Instruct your end users to sign in to the Secure Access Module app to transfer connection attempts to configured Private Access Connectors or Internet Access Gateways that enforce Private Access and Internet Access rules.