: Getting started
Focus
Focus

Getting started

Table of Contents

Getting started

Next-Gen Trust Security helps you monitor, organize, and act on certificates that already exist in your environment with focus is on visibility, risk identification, and manual certificate lifecycle actions through the UI.
This page helps you orient yourself and find the right starting points in the product.

Start with visibility

Begin by reviewing the current state of your certificate inventory.
  1. TLS Certificates dashboardUse the dashboard to get a high-level view of certificate health, including expired and expiring certificates. From the dashboard, you can drill into filtered views of the certificate inventory to investigate issues.
  2. Certificate inventoryThe certificate inventory is the central place to view all certificates available to you. From here, you can search, filter, and open individual certificates to review details and take action.

Organize and analyze certificates

Once you understand what certificates are present, you can organize and analyze them to focus on what matters most.
  1. Tag certificatesUse tags to group certificates by application, team, environment, or purpose. Tags make it easier to filter the inventory and manage ownership.
  2. Use reportsUse built-in and custom reports to review certificate usage, expiration trends, and other certificate-related data directly in the UI.

Take action on certificates

From the certificate inventory, you can perform manual lifecycle actions to reduce risk and prevent outages.
Common actions include:
  • Renewing certificates
  • Revoking certificates
  • Retiring or recovering certificates
  • Reviewing certificate history and related events

Review activity and changes

Use the event log to understand who performed actions in the system and when.
You can filter events to review certificate-related activity, administrative changes, or authentication events as part of troubleshooting or security reviews.

About permissions and setup

Some features described here require administrator permissions. If you cannot access a feature, contact your administrator.
Configuration, integrations, and automated workflows are managed outside of Next-Gen Trust Security and are not covered in this documentation.

What’s next

Most users start with the TLS Certificates dashboard and the certificate inventory, then move on to tagging, reporting, and event review as needed.