The increasing connectivity and intricate remote access environment have made traditional perimeter-based network defense vulnerable. zero trust becomes a promising approach to provide defense policies based on agent-centric trust evaluation. However, the limited observations of the ag