Getting Started with Trusted Endpoints

Getting Started with Trusted Endpoints

Learn how Duo Mobile, the Device Health Application, and Trusted Endpoints work together to verify endpoint trust and restrict access from unmanaged devices.

rate limit

Code not recognized.

About this course

About this course

Trusted Endpoints, available Duo Essentials, Duo Advantage, and Duo Premier plans, adds another layer of defense to your security strategy and can help significantly reduce the risk of unauthorized access by making it harder for an attacker to gain access to your Duo-protected applications.

This feature helps you distinguish between unmanaged endpoints and managed endpoints that access your browser-based applications. The Trusted Endpoints policy tracks whether clients accessing the applications can be identified as managed, or can block access to various applications from systems that aren’t managed. You can enforce device-based access policies based on whether a device can be found in your organization’s device management system, giving you the power to restrict and block access from untrusted devices.

This course will focus on implementations that use the Device Health application to verify endpoints for Windows and macOS devices and the Duo Mobile application for Android and iOS devices. We’ll explore strategies for managing and setting up Trusted Endpoints in your organization. 

By the end of this course, you should be able to:

  • Understand how Trusted Endpoints establishes verifies endpoint trust. 
  • Describe the end-user authentication experience for Trusted Endpoints integrations.
  • Enable test mode on the Trusted Endpoints configuration page.
  • Utilize best practices for a managed deployment of Trusted Endpoints.
  • Use the Endpoints page in the Admin Panel to audit end-user activity, device health, troubleshoot access issues, and revoke access.
  • Locate resources for deploying and troubleshooting Trusted Endpoints.

Note: This course is optional for the Device Trust certification exam.

New to the Device Health Application? 
We suggest taking Improving End-User Security with Duo Device Health before this course, or we recommend consulting the setup documentation and End-User Guide for an introduction to the Device Health Application.

 

Curriculum

  • Introduction to Getting Started with Trusted Endpoints
  • Getting Started with Trusted Endpoints Course Overview
  • DHA and Duo Mobile Trusted Endpoints Verification
  • Introduction to the DHA and Duo Mobile Trusted Endpoints Verification
  • Device Health Application
  • How the Device Health Application Verifies Endpoint Trust
  • Duo Mobile Verification
  • Device Certificate Verification
  • Deploying Trusted Endpoints
  • Introduction to Deploying Trusted Endpoints
  • Setting Up Trusted Endpoints
  • Testing Trusted Endpoints
  • Best Practices for Deploying Trusted Endpoints
  • Phase One: Technical Users
  • Phase Two: Introducing Everyone to Trusted Endpoints
  • Managing Trusted Endpoints
  • Introduction to Managing Trusted Endpoints
  • End-User Experience & Policy Settings
  • Monitoring Trusted Endpoints Integration
  • Revoking Access
  • Course Overview
  • Course Recap
  • Share Feedback (Optional)
  • Knowledge Check
  • Course Complete

About this course

About this course

Trusted Endpoints, available Duo Essentials, Duo Advantage, and Duo Premier plans, adds another layer of defense to your security strategy and can help significantly reduce the risk of unauthorized access by making it harder for an attacker to gain access to your Duo-protected applications.

This feature helps you distinguish between unmanaged endpoints and managed endpoints that access your browser-based applications. The Trusted Endpoints policy tracks whether clients accessing the applications can be identified as managed, or can block access to various applications from systems that aren’t managed. You can enforce device-based access policies based on whether a device can be found in your organization’s device management system, giving you the power to restrict and block access from untrusted devices.

This course will focus on implementations that use the Device Health application to verify endpoints for Windows and macOS devices and the Duo Mobile application for Android and iOS devices. We’ll explore strategies for managing and setting up Trusted Endpoints in your organization. 

By the end of this course, you should be able to:

  • Understand how Trusted Endpoints establishes verifies endpoint trust. 
  • Describe the end-user authentication experience for Trusted Endpoints integrations.
  • Enable test mode on the Trusted Endpoints configuration page.
  • Utilize best practices for a managed deployment of Trusted Endpoints.
  • Use the Endpoints page in the Admin Panel to audit end-user activity, device health, troubleshoot access issues, and revoke access.
  • Locate resources for deploying and troubleshooting Trusted Endpoints.

Note: This course is optional for the Device Trust certification exam.

New to the Device Health Application? 
We suggest taking Improving End-User Security with Duo Device Health before this course, or we recommend consulting the setup documentation and End-User Guide for an introduction to the Device Health Application.

 

Curriculum

  • Introduction to Getting Started with Trusted Endpoints
  • Getting Started with Trusted Endpoints Course Overview
  • DHA and Duo Mobile Trusted Endpoints Verification
  • Introduction to the DHA and Duo Mobile Trusted Endpoints Verification
  • Device Health Application
  • How the Device Health Application Verifies Endpoint Trust
  • Duo Mobile Verification
  • Device Certificate Verification
  • Deploying Trusted Endpoints
  • Introduction to Deploying Trusted Endpoints
  • Setting Up Trusted Endpoints
  • Testing Trusted Endpoints
  • Best Practices for Deploying Trusted Endpoints
  • Phase One: Technical Users
  • Phase Two: Introducing Everyone to Trusted Endpoints
  • Managing Trusted Endpoints
  • Introduction to Managing Trusted Endpoints
  • End-User Experience & Policy Settings
  • Monitoring Trusted Endpoints Integration
  • Revoking Access
  • Course Overview
  • Course Recap
  • Share Feedback (Optional)
  • Knowledge Check
  • Course Complete