Views:

Set up Internet Access and automatically migrate your settings and access rules from TrendAI™ Web Security.

Upgrade from TrendAI™ Web Security to Zero Trust Secure Access Internet Access to fully integrate your secure web gateway solution with TrendAI Vision One™. Internet Access helps you better enforce access controls and more effectively reduce risk.
The upgrade process migrates your applicable policies, cloud gateways, and other settings from TrendAI™ Web Security to Internet Access. Migrated rules have a higher priority than any existing rules in Internet Access.
Note
Note
Important
Important
The following instructions only apply to customers with an active license for TrendAI™ Web Security. For the regular Internet Access setup process, see Set up Zero Trust Secure Access Internet Access and AI Secure Access.

Procedure

  1. Integrate your IAM (Identity and Access Management) system with Zero Trust Secure Access.
  2. Configure a secure internet gateway.
  3. Migrate your settings from TrendAI™ Web Security to Internet Access.
    1. On the TrendAI Vision One™ console, go to Zero Trust Secure AccessSecure Access ConfigurationInternet Access and AI Secure Access Configuration.
    2. Verify that the Internet Access Control toggle is off.
    3. Click Upgrade Web Gateway.
      The Migrate Settings from Existing Products panel opens.
    4. Click Migrate Settings.
    5. Verify that TrendAI™ Web Security is selected.
    6. Read the TrendAI™ Agreement, Global Privacy Notice, and Data Collection Notice.
    7. Acknowledge that you have read the applicable legal notices by selecting the check box.
    8. Click Migrate to start the settings migration process..
    The settings migration process begins. The process might take several minutes, depending on the amount of settings that need to be migrated.
  4. Verify that your Internet Access settings are correct.
  5. On the Internet Access Configuration screen, enable the Internet Access Control toggle.
    Internet Access begins analyzing web activity in your organization and enforces secure access rules on your users.