Step 4 – Configure Endpoints and Network Sources
The Get Started with Secure Access workflow guides you through the tasks in the What's Next step—configure your organization's user devices, add registered and internal networks to Secure Access, and configure IPS and endpoint posture profiles in policy rules.
Table of Contents
- Prerequisites
- Add Networks to Secure Access
- Set Up the Cisco Secure Client
- Add IPS Profiles
- Configure Rule Profiles
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
Add Networks to Secure Access
Set Up the Cisco Secure Client
- Download the Cisco Secure Client
- Download the OrgInfo.json File
- Download the VPN XML File
- Install the Cisco Secure Client
- Manage Zero Trust Access on Cisco Secure Client
Add IPS Profiles
Configure Rule Profiles
Step 3 – Configure End User Connectivity< Step 4 – Configure Endpoints and Network Sources > Secure Access Overview
Updated 10 months ago