Step 4 – Configure Endpoints and Network Sources
The Get Started with Secure Access workflow guides you through the tasks in the What's Next step—configure your organization's user devices, add registered and internal networks to Secure Access, and endpoint posture profiles in policy rules.

Table of Contents
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
Add Networks to Secure Access
Set Up the Cisco Secure Client
- Download the Cisco Secure Client
- Download the OrgInfo.json File
- Download the Virtual Private Network XML Profile
- Install the Cisco Secure Client
- Manage Zero Trust Access on Cisco Secure Client
Add IPS Profiles
Configure Rule Profiles
Step 3 – Configure End User Connectivity< Step 4 – Configure Endpoints and Network Sources > Secure Access Overview Dashboard
Updated 17 days ago