Ivanti Neurons for Zero Trust Access: Tenant Admin Guide¶
- End User License Agreement
- Preface
- About this Guide
- Overview of Ivanti Neurons for Zero Trust Access
- Securing a Diverse Application Infrastructure
- Hyper-Converged Zero-Trust Access
- An Overview of Ivanti Neurons for Zero Trust Access
- Deploying and Using nZTA
- Using a Custom Domain
- Deploying Gateways
- Defining User Authentication
- Publishing Applications
- Enrolling a User Device
- Viewing Licensing/Subscription Usage
- Summary of Steps to Configure Your nZTA Deployment
- Logging in as a Tenant Admin
- Specifying a Custom Domain
- Configuring CASB/SWG
- Working With User Authentication
- Introduction
- Viewing User Authentication Methods
- Viewing User Authentication Policies
- Creating User Rules and User Groups
- Workflow: Creating a Local Authentication Policy
- Workflow: Creating a SAML Authentication Policy With Azure AD
- Workflow: Creating an Authentication Policy for On-Premises ICS SAML
- Configuring Secondary Authentication for On-Premises ICS (Optional)
- Configuring a SAML Identity Provider in Ivanti Connect Secure
- Configuring a Metadata Provider in Ivanti Connect Secure
- Defining an On-Premises SAML Authentication Method
- Defining Authentication Policies for On-Premises SAML Authentication
- Configuring ICS with Controller Metadata
- Workflow: Creating a SAML Authentication Policy for Okta
- Workflow: Creating a SAML Authentication Policy for Ping Identity
- Workflow: Adding TOTP to an Authentication Policy
- Working With Gateways
- Introduction
- Configuring Networks in your Gateway Datacenter
- Using Dynamic IP Addressing to Profile Client Traffic
- White-listing Required IP Addresses for your Services
- Viewing and Monitoring Gateways in the Controller
- Adding Gateway Groups for High Availability
- Creating Gateway Selectors
- Workflow: Creating a Gateway in VMware vSphere
- Workflow: Creating a Gateway in Amazon Web Services
- Workflow: Creating a Gateway in Microsoft Azure
- Workflow: Creating a Gateway in KVM/OpenStack
- Workflow: Creating a Gateway in Google Cloud Platform
- Preparing to Create a GCP Gateway
- Adding a GCP Gateway in nSA
- Downloading Metadata for Google Cloud Platform
- Uploading the GCP Virtual Machine Image onto the Google Cloud Platform
- Creating a VM Instance of the Uploaded GCP Image Manually
- Creating a VM Instance of the Uploaded GCP Image Using a Script/Template
- Completing the Configuration of the Controller
- Upgrading Gateways
- Configuring a Default Gateway for Application Discovery
- Creating Device Policy Rules and Device Policies
- Introduction
- Viewing Device Policies and Rules
- Creating Device Policies
- Configuring Default Device Policy for Users
- Creating Device Policy Rules
- Options for Antispyware and Firewall Rules
- Options for Antivirus Rules
- Options for CVE Check Rules
- Options for Command Rules
- Options for File Rules
- Options for Hard Disk Encryption Rules
- Options for Location Rules
- Options for MAC Address Rules
- Options for Netbios Rules
- Options for Network Rules
- Options for OS Rules
- Options for Process Rules
- Options for Port Rules
- Options for Patch Management Rules
- Options for Registry Rules
- Options for Risk Sense Rules
- Options for System Integrity Rules
- Options for Time of Day Rules
- Working With Applications and Application Groups
- Creating/Editing Secure Access Policies
- Enrolling Mobile/Desktop Clients
- Using Ivanti Secure Access Client with Ivanti Neurons for Zero Trust Access
- Upgrading Ivanti Secure Access Client
- Using the Insights Menu to Monitor User Activity and Service Usage
- Introduction
- Reviewing Your Network Activity
- Reviewing User Activity
- Showing Activity for a Specific User
- Viewing and Terminating User Sessions
- Reviewing Application Usage
- Showing Usage Data for a Specific Application
- Monitoring ZTA Gateway Activity
- Reviewing Policy Failures
- Checking the Logs
- Associating Geographical locations to IP Addresses
- Actions
- Reports
- Viewing Alerts and Notifications
- Using Enterprise Integration to Export Your Logs for External Analysis
- APPENDIX: Supported Applications in this Release