Welcome to Cloudflare Zero Trust. This guide covers the main steps you need to take to set up your Zero Trust environment.
- A Cloudflare account
Start from the Cloudflare dashboard
Complete your onboarding by selecting a subscription plan and entering your payment details. If you chose the Zero Trust Free plan, please note this step is still needed, but you will not be charged.
Welcome to the Zero Trust dashboard! Your account has been created. You can now explore a list of one-click actions we have designed to help you kickstart your experience with Cloudflare Zero Trust.
Install the WARP client on your devices
If you want to enable security features such as Browser Isolation, HTTP filtering, AV scanning, and device posture, or connect networks to Cloudflare, here are the next steps you need to take:
Next, define . Create device enrollment rules to define which users in your organization should be able to connect devices to your organization’s Zero Trust setup. As you create your rule, you will be asked to select which login method you would like users to authenticate with.
Install the on your devices. Advanced security features including HTTP traffic inspection require users to install and trust the Cloudflare root certificate on their machine or device. If you are installing certificates manually on all your devices, these steps will need to be performed on each new device that is to be subject to HTTP filtering.
Log in to your organization’s Cloudflare Zero Trust instance from your devices. On your device, navigate to the Settings section in the WARP client and insert your organization’s team name.
Check your Zero Trust environment
Now that your environment is set up, you have in-depth visibility into your network activity.
View your Devices in Cloudflare Zero Trust. Navigate to My Team > Devices to find a list of your enrolled devices, when they were last seen, and the WARP client version they are running.
View your Users in Zero Trust. Navigate to My Team > Users to check who is currently an active user in your Zero Trust environment, revoke users, and check information such as last login, location, and devices they use.
View Analytics. Navigate to the Analytics section to check which SaaS applications your users are accessing and view a summary of the top Allowed and Blocked requests.
View Logs. Navigate to the Logs section for an overview of events in your network. Deep-dive into which access requests were made, and check which queries were filtered by Gateway and the action that was enforced on each of them.