While access from engineers may be logged, given the sheer amount of legimate access that takes place, using audits to detect rogue access would be near to impossible.
![solarwinds msp solarwinds msp](https://cdn.staticaly.com/gh/bcurran3/ChocolateyPackages/master/solarwinds-advanced-monitoring-agent/solarwinds-advanced-monitoring-agent_screenshot.png)
The solution is to require permission from the customer before access is granted to engineers, which is only an option if you are on E5 licensing with Office 365. Our products are designed to enable MSPs to provide highly-effective outsourced IT services for their SMB end-customers and more efficiently manage their own businesses. Zero trust networking would do very little to prevent a rogue admin/support engineer from doing damage/stealing data, since their network permissions would grant them access to the sensitive data. Targeted for MSPs, the SolarWinds MSP product portfolio delivers broad, scalable IT service management solutions that integrate layered security, collective intelligence, and smart automation. only users with permission to access accounts services can even see the accounting servers, only users with HR permissions can see the HR servers etc), and access is restricted between services using micro-segmentation (e,g, the mail servers have no access to the DB servers, while the DB servers have SMTP access to the mail servers but no other access, both mail and DB have access to directory servers for authentication, but directory servers have no access to either etc etc) SolarWinds MSP, a global leader in delivering comprehensive, scalable IT service management solutions to IT solution providers and MSPs, has recently launched its MSP Institute, a playbook for MSPs designed to provide training and tips through business, sales, marketing, and technical tracks from experts and industry leaders.
![solarwinds msp solarwinds msp](http://infinigate-msp.fr/con_images/products/slideshow/produkte_slideshow4_006.jpg)
I think you may misunderstand the nature of Zero Trust networking - instead of using a DMZ to establish a buffer between "trusted" (LAN) and "untrusted" (WAN) networks, you assume that every device/user is untrusted until they are authenticated no matter where they are connecting from, and use granular permissions to further restrict access at the network layer (i.e.