How-to Guides
Step-by-step guides for configuring and operating Threatmatic™
Practical, task-oriented guides to help you get the most out of Threatmatic™. Browse by category or use the search to find what you need.
Categories
- Getting Started — Deploy and activate Threatmatic for the first time
- Network — Configure circuits, routing, and bandwidth policies
- Identity — Set up users, groups, and identity-aware policies
- Devices — Enroll, manage, and audit endpoints
- Policies — Build and apply Zero Trust security policies
How is this guide?
Last updated on