Software Secure Workload

About This Guide

Last updated: May 30, 2025

About This Guide

This document, which is applicable for onboarding Secure Workload:

  • Introduces the key Secure Workload concepts: Segmentation, Workload labels, Scopes, Hierarchical scope trees, and Policy discovery.

  • Explains the process of creating the first branch of your scope tree using the first-time user experience wizard.

  • Describes the automated process of generating policies for the chosen application that is based on actual traffic flows.