Enforce device posture
With Cloudflare Zero Trust, you can configure Zero Trust policies that rely on additional signals from the WARP client or from third-party endpoint security providers. When device posture checks are configured, users can only connect to a protected application or network resource if they have a managed or healthy device.
1. Enable device posture checks
Setup instructions vary depending on the device posture attribute. Refer to the links below to view the setup guide for your provider.
- are performed by the Cloudflare WARP client.
- are performed by third-party device posture providers.
- are only configurable for Access applications. These attributes cannot be used in Gateway policies.
2. Verify device posture checks
Before integrating a device posture check in a Gateway or Access policy, go to Logs > Posture and verify that the Pass/Fail results match your expectations.
3. Build a device posture policy
You can now use your device posture check in an or a Gateway . In Access, the enabled device posture attributes will appear in the list of available . In Gateway, the attributes will appear when you choose the selector.
4. Ensure traffic is going through WARP
- The IdP used to authenticate to Cloudflare Zero Trust if posture check is part of an Access policy.
<your-team-name>.cloudflareaccess.comif posture check is part of an Access policy.
- The application protected by the Access or Gateway policy.
Policy enforcement rate
Because Gateway evaluates network and HTTP policies on every request, it maintains a local cache of posture results that is only updated every five minutes. Therefore, Gateway policies are subject to an additional five-minute delay. For example, if you set your polling frequency to 10 minutes, it may take up to 15 minutes for Gateway to detect posture changes on a device.
By default, the posture result on Cloudflare remains valid until it is overwritten by new data. You can specify an
expiration time using our . We recommend setting the expiration to be longer than the .