Zero Trust Policies and Rules
  • 29 Apr 2024
  • 1 Minute to read
  • Contributors

    Zero Trust Policies and Rules

      Article Summary

      Understanding Zero Trust Policies and Rules

      Zero Trust Application Access Policies enable you to define granular level permissions to ensure that only authorized users have access to specific applications.

      Policies and rules are an additional layer of security for our Zero Trust Applications.
      They provide Administrators and Managers with the ability to set granular sets of rules into Policies that will limit access to internal and cloud resources based on Groups, Date and Time, Geo-location, Operating Systems, Browsers, and much more.

      How to Set Up Zero Trust Policies and Rules

      Defining and applying policies

      1. To set up the policy rules, go to the Applications tab, select Application Policies, then click Add Policy.

      2. Assign a name to your policy along with any applicable operators, then click Add Rule.

      3. Select the rule (or rules) from which you will define the parameters of this policy. Available parameters include: Group, Date and Time, Location (IP), Location (Country), Browser, OS

      4. You can attach any existing policies you may have previously created by clicking the 'Add Policy' button. Lastly, click save.


      1. Always review your application access policies periodically to ensure they are up-to-date with organizational needs.
      2. Test new policies on a small group before rolling them out organization-wide.


      If you encounter issues during or after the setup, try reviewing your settings to ensure everything matches the instructions. In particular, check the IP addresses and other details you entered during setup. If issues persist, please consult our dedicated support.

      Support Contacts

      If you have any difficulties or questions, don't hesitate to contact Perimeter 81's support team. We offer 24/7 chat support on our website at, or you can email us at We're here to assist you and ensure your VPN tunnel setup is a success

      Was this article helpful?

      What's Next