Begin Secure Access Onboarding Workflow

👍

Secure Access Packages and Feature Availability

Not all of the features described here are available to all Secure Access packages. Information about your current package is listed on the Admin > Licensing page. For more information, see Determine Your Current Package. If you encounter a feature here that you do not have access to, contact your sales representative for more information about your current package. See also, Cisco Secure Access Packages.

The Get Started with Cisco Secure Access workflow guides you through the initial setup of Secure Access. Sign in to Secure Access and navigate to Workflows. The first step in the Get Started workflow takes you through the setup of your organization's network connections—network tunnel groups and network tunnels. At the same time, you can provision users and groups from your organization in Secure Access and set up integrations with Security Assertion Markup Language (SAML) identity providers (IdPs).

After you establish network connections, begin the Secure resources and access step in the Get Started workflow. Secure resources and access includes: designing endpoint posture profiles, IPS and security profiles, and policy rules. Then, in the Configure end user connectivity step, define traffic patterns for remote user connections to resources—configure DNS servers, Zero Trust, virtual private networks (VPNs), and internet security settings.

As an administrator, review and audit connections and traffic events in the Secure Access logs and reports. Start with the Secure Access Overview. For more information, see Secure Access Overview.


Get Started < Begin Secure Access Onboarding Workflow > Step 1 – Configure Network Connections