Getting Started With Zero Trust Secure Access

Configure settings in the Trend Micro Vision One console and in other systems in your environment.

  1. Set up the resources in your environment.
    • Configure your IAM related settings.

      This allows Trend Micro Vision One to access user data, authenticate users through single sign-on, and control sign-in activity on your IAM system.

      For more information, see Identity and Access Management.

    • Go to the Private Access Configuration screen to deploy the Trend Micro private access service.

      This allows Trend Micro Vision One to help you control access to the internal resources of your organization.

      For more information, see Private Access Configuration.

    • Go to the Internet Access Configuration screen to deploy the Trend Micro internet access service.

      This allows Trend Micro Vision One to help you control access to cloud apps and external websites.

      For more information, see Internet Access Configuration.

  2. Configure secure access rules to enforce access control by risk, identity, time, and location.
  3. Go to the Secure Access Overview screen to view the access control statistics for risk investigation and rule adjustment.
  4. Go to the Access Control History screen to view access control logs.