Manage Zero Trust Application Policies
You can create, edit, and delete zero trust application policies.
Procedure
Step 1 | Choose |
Step 2 | Manage the zero trust access policies:
|
Step 3 | Click Save. |
What to do next
Ensure that there are no warnings before you deploy the configuration to threat defense. To deploy configuration changes, see Deploy Configuration Changes in the Cisco Secure Firewall Management Center Administration Guide.