Zero Trust Access The following topics provide an overview of Zero Trust Application Policies and how to configure and deploy them. About Zero Trust AccessHow Threat Defense Works with Zero Trust AccessWhy Use Zero Trust Access?Components of a Zero Trust Access ConfigurationZero Trust Access WorkflowLimitations for Zero Trust AccessPrerequisites for Zero Trust Application PolicyManage Zero Trust Application PoliciesCreate a Zero Trust Application PolicyCreate an Application GroupCreate an ApplicationSet Targeted Devices for Zero Trust Access PolicyEdit a Zero Trust Application PolicyMonitor Zero Trust SessionsHistory for Zero Trust Access