Step 1: Configure your applications. We went over this briefly in yesterday’s email.
Step 2: Add your specific user groups and then set up access controls. Here’s a step by step guide on how to do that. Access controls determine who gets access to what — and is a core tenant of ZTNA.
Step 3: Set up Cyber Shield, a powerful tool that provides an additional layer of protection for your users. Cyber Shield offers extensive content and traffic filtering, automatically logging and blocking malicious traffic — from malware to DDoS to intrusion detection.
We also have a step-by-step video for you on ZTNA: