Zero Trust

Integrate with supported Identity and Access Management providers to send trust data about managed endpoints.



Get started quickly with Zero Trust
Learn about Zero Trust
  • Overview

    Understand terminology and how Zero Trust integrates with Identity and Access Management providers

  • Requirements

    Review the system requirements, required configurations, and user role configurations

Use Zero Trust
  • Create rules

    Create rules to target endpoints when an event occurs

  • Audit events

    Monitor events and review data shared with your Identity and Access Management provider

Other resources
  • Release notes

    Get a list of changes for each Zero Trust release

  • Community

    Read articles written by Tanium subject-matter experts on Zero Trust best practices