About This Guide
This document, which is applicable for onboarding Secure Workload:
-
Introduces the key Secure Workload concepts: Segmentation, Workload labels, Scopes, Hierarchical scope trees, and Policy discovery.
-
Explains the process of creating the first branch of your scope tree using the first-time user experience wizard.
-
Describes the automated process of generating policies for the chosen application that is based on actual traffic flows.