1.1 Follow the steps outlined on the Trust Profile doc to learn about how Trust Profiles function.
2.1 Use any implementation of a Trust Profile configuration (e.g., the Application Check Trust Factor) as a template for how to configure a Trust Profile to check your devices’ security posture.