0:04 Welcome to Versa Concerto, your orchestration platform for all SASE services. 0:09 Today we will review the Configurations tab. 0:12 First we will click on the Configure tab and we see the four sub menus. 0:17 Internet Protection is for you to configure your web security policies. 0:21 Private Access Protection allows you to configure your Zero Trust network access policies. 0:27 Secure Clients allows you to configure your clients on endpoints. 0:31 Lastly, the settings allows you to configure additional features like TLS decryption, how users will be authenticated, certificate policies, and more. 0:40 Let's start with the Internet protection. 0:44 Here you see that we have already configured a rule, but let's review what else you can configure. 0:49 Let's start with an application level access. 0:52 Here are all of our applications and we can select one like Facebook where we will deny our users from accessing. 1:00 We can hit reject to reject any connections to this application. 1:04 You can see below that you also have the option to add additional security services like malware protection and URL filtering. 1:11 We will quickly name this rule and just like that, your new Internet protection rule is now set. 1:17 Now let's move on to the private access protection. 1:21 To start a Zero Trust network access connection, you need to 1st configure a site to site tunnel. 1:27 In this configuration, you have the client that is connecting to the Versa SASE Cloud, which is connected to the customer environment. 1:34 We will click here and we can choose between an IP, SEC or a GRE tunnel. 1:38 And below we can configure different routes. 1:41 After that, we can configure geolocation and geofencing rules that protect us from unauthorized access and specify parameters like which users and which groups are allowed to access which applications. 1:53 Next, let's move on to the secure client access. 1:57 Here you can configure client rules such as the identity directory, the authentication profile of the client, and pull in your security policies from mobile device management platforms such as Microsoft Intune. 2:10 Let's click here to set our profile parameters. 2:12 On the client, we can figure out what routes are connecting to the users and what are the DNS resolvers. 2:20 For routes, we can add an internal route such as subnet 10 point O, point O point O/24, which is now encrypted and accessible by the client. 2:30 For DNS, we can add an internal DNS here and click save, allowing us to quickly create a client access profile that contains both the routes and the DNS information. 2:41 And just like that you can see how easy it is to configure policies within Versa Concerto.