Step 4 – Configure Endpoints and Network Sources

The Get Started with Secure Access workflow guides you through the tasks in the What's Next step—configure your organization's user devices, add registered and internal networks to Secure Access, and configure IPS and endpoint posture profiles in policy rules.

Table of Contents

Prerequisites

Add Networks to Secure Access

Set Up the Cisco Secure Client

Add IPS Profiles

Configure Rule Profiles


Step 3 – Configure End User Connectivity< Step 4 – Configure Endpoints and Network Sources > Secure Access Overview