Jump to Content
Cisco Secure Access Help
Guides
Secure Access Help CenterCisco Secure Access Help
Guides
Secure Access Help Center
Guides

Cisco Secure Access Help

  • Welcome to Cisco Secure Access
    • Sign into Secure Access with Security Cloud Sign On
    • Find Your Organization ID
    • Determine Your Current Package
    • View Cloud Security Service Status
    • Contact Cisco Secure Access Support
  • Secure Access Single Sign-On Authentication
    • Configure Single Sign-On Authentication
    • Troubleshoot Single Sign On Authentication
  • Get Started
    • Begin Secure Access Onboarding Workflow
    • Step 1 – Configure Network Connections
    • Step 2 – Configure Access to Resources
    • Step 3 - Configure End User Connectivity
    • Step 4 – Configure Endpoints and Network Sources
    • Secure Access Overview Dashboard
  • Quickstarts
    • Quickstart – Cisco Secure Client with Zero Trust Access
    • Quickstart – Cisco Secure Client with Virtual Private Network
    • Quickstart – Cisco Secure Client with Internet Security
    • Quickstart – Browser with SAML Authentication
    • Quickstart – Bring Your Own Device with Zero Trust
  • Limitations and Range Limits
  • Network Requirements for Secure Access
  • Secure Access NAT as a Service
    • Reserved IP
    • Reserved IP Supplemental Terms
  • Manage Network Connections
    • Comparison of Network Connection Methods
  • Manage Network Tunnel Groups
    • Device Compatibility and Network Tunnels
    • Add a Network Tunnel Group
    • Delete a Network Tunnel Group
    • Edit a Network Tunnel Group
    • View Network Tunnel Group Details
    • Supported IPsec Parameters
  • Network Tunnel Configuration
    • Routing Options and Guidelines
      • Static Routing
      • Dynamic Routing Using BGP
    • Configure Tunnels with Cisco Catalyst SD-WAN
    • Configure Tunnels with Cisco ISR
    • Configure Tunnels with Cisco Adaptive Security Appliance
    • Configure Tunnels with Cisco Secure Firewall
    • Configure Tunnels with Meraki MX
    • Configure Tunnels with NEC IX2000 Series Router
  • Manage Resource Connectors and Connector Groups
    • Requirements and Prerequisites for Resource Connectors and Connector Groups
    • Allow Resource Connector Traffic to Secure Access
    • Add Resource Connector Groups
    • Add Connectors to a Connector Group
    • Obtain the Connector Image
    • Provisioning Keys for Resource Connectors
    • Deploy a Connector in VMware
    • Deploy a Connector in AWS
    • Deploy a Connector in Azure
    • Deploy a Connector in Docker
    • Determine the Number of Connectors Needed in a Connector Group
    • Assign Private Resources to a Connector Group
    • View a Connector Group's Connectors and Assigned Resources
    • Edit a Resource Connector Group
    • Disable, Revoke, or Delete Resource Connectors and Groups
    • Maintain and Monitor Resource Connectors and Connector Groups
    • Troubleshoot Resource Connectors and Connector Groups
  • Secure Access Regions
  • Manage Users, Groups, and Endpoints Devices
    • View User Details
    • View Group and Organizational Unit Details
    • View Endpoint Device Details
    • Unenroll Devices for Client-Based Zero Trust Access
    • Disconnect Remote Access VPN Sessions
  • Manage User Directories and Device Management
    • Configure User Directory Integrations
    • Manage Cloud Identity Providers
      • Add a Cloud Identity Provider
      • Edit an Identity Provider Integration
      • Delete an Identity Provider Integration
    • Import Users and Groups from CSV File
    • Manage Active Directory Integration
    • Manage Google Workspace Account
    • Manage Imported Users and Groups
  • Manage Advanced Configuration Settings
    • Manage IP Surrogates for User Authentication
  • Configure Identity Providers
    • Provision Users and Groups from Okta
    • Provision Users and Groups from Microsoft Entra ID
  • Provision Users, Groups, and Endpoint Devices from Active Directory
    • Prerequisites for AD Connectors
    • Connect Multiple Active Directory Domains
    • Manage AD Components
      • Add AD Components in Secure Access
      • Manage Sites for AD Components
      • View AD Components in Secure Access
      • Delete AD Components
    • Manage AD Connectors
      • Configure Authentication for AD Connectors and VAs
      • Configure Updates on AD Connectors
      • Connect Active Directory to Secure Access
      • Deploy LDIF Files for AD Connector
      • Change the Connector Account Password
      • AD Connector Communication Flow and Troubleshooting
    • AD Integration with Virtual Appliances
      • Prerequisites for AD Connectors and VAs
      • Prepare Your AD Environment
      • Connect Active Directory to VAs
      • Multiple AD Domains with Secure Access Sites
  • Manage User Authentication Profiles
    • Add SSO Authentication Profiles
    • About Single Sign-On for Users
    • Edit an SSO Authentication Profile
    • Delete SSO Authentication Profile
  • Configure Integrations with OIDC Identity Providers
    • Configure Okta for OpenID Connect
    • Configure Microsoft Entra ID for OpenID Connect
  • Configure Integrations with SAML Identity Providers
    • Prerequisites for SAML Authentication
    • Configure Microsoft Entra ID for SAML
    • Configure Okta for SAML
    • Configure AD FS for SAML
    • Configure Duo Security for SAML
    • Configure Ping Identity for SAML
    • Configure OpenAM for SAML
    • SAML Certificate Renewal Options
    • Test SAML Identity Provider Integration
  • Manage End-User Connectivity
  • FQDNs for Network Connections
  • Manage DNS and DDNS Servers
    • Manage DNS Servers
    • Map DNS Servers to Regions
    • Manage DDNS Servers
    • Map DDNS Servers to Regions
  • Manage Virtual Private Networks
    • Manage Regions and IP Pools
    • Add an IP Pool
    • Assign and Modify IP Pools
    • Manage RADIUS Servers and Groups
    • Manage VPN Profiles
    • Add VPN Profiles
    • Add a RADIUS Group
    • Manage Machine Tunnels
      • Machine Tunnel - What to do Next
      • Authenticate Device Identity with Active Directory
      • Provision a Machine Tunnel User
    • Manage Application-Based Remote Access VPN (Per App VPN)
    • Manage Custom Attributes
      • Define Custom Attributes
    • Manage Secure Client Scripts
  • Traffic Steering for Zero Trust Access Client-Based Connections
    • Using Wildcards to Configure Traffic Steering for Private Destinations
  • Manage Internet Security
    • Set Up Internet Security on User Devices
    • Manage Internet Security Bypass
      • Add Destinations for Internet Security Bypass
      • Edit Destination for Internet Security Bypass
      • Delete Destination for Internet Security Bypass
    • Configure Cisco Secure Client Settings
  • Manage PAC Files
    • Deploy the Secure Access PAC File for Windows
    • Deploy the Secure Access PAC File for macOS
    • Customize the Secure Access PAC File
    • Upload Custom PAC Files to Secure Access
  • Manage Proxy Chaining
    • Forwarded-For (XFF) Configuration
  • Manage Registered Networks
    • Add Network Resources
    • Point Your DNS to Cisco Secure Access
    • Clear Your DNS Cache
    • Update a Network Resource
    • Delete a Network Resource
  • Manage Internal Networks
    • Add Internal Network Resources
    • Update an Internal Network Resource
    • Delete an Internal Network Resource
  • Manage Sites
  • Manage Destination Lists
    • Add a Destination List
    • Upload Destinations From a File
    • Edit a Destination List
    • Download Destinations to a CSV File
    • Control Access to Custom URLs
    • Wildcards in Destination Lists
    • Troubleshoot Destination Lists
  • Manage AAA Servers
  • Manage Internet and SaaS Resources
  • Manage Application Lists
    • Add an Application List
    • Application Categories
    • Delete an Application List
  • Manage Content Category Lists
    • Available Content Categories
    • Add a Content Category List
    • Request a Category for an Uncategorized Destination
    • Dispute a Content Category
    • View Content Categories in Reports
  • Manage Tenant Control Profiles
    • Add a Tenant Controls Profile
    • Control Cloud Access to Microsoft 365
    • Control Cloud Access to Google G Suite
    • Control Cloud Access to Slack
    • Control Cloud Access to Dropbox
    • Control Cloud Access to YouTube
    • Use Tenant Controls in Access Rules
    • Review Tenant Controls Through Reports
  • Manage Network Devices
  • Manage Roaming Devices
    • View Internet Security Settings for Roaming Devices
    • Edit Internet Security Settings for Roaming Devices
    • Delete a Roaming Device
  • Manage Private Resources
    • Add a Private Resource
    • Discover Private Resources
    • Test Private Resource Reachability
    • Add a Private Resource Group
    • Private Resource Configuration Examples
  • Manage Connections to Private Destinations
    • Comparison of Zero Trust Access and VPN
    • Comparison of Client-Based and Browser-Based Zero Trust Access Connections
    • Requirements for Zero Trust Access
    • Configure Client-Based Zero Trust Access for Private Destinations
    • Configure Browser-Based Zero Trust Access to Private Resources
    • Network Authentication for Zero Trust Access
    • Connection Scenarios for Private Destinations
    • Manage Branch Connections
    • Allow SSH and RDP Access to Private Resources
  • Manage Network and Service Objects
    • Manage Network Objects
      • Add Network Objects
      • Edit a Network Object
      • Manage Details of a Network Object
      • Delete a Network Object
    • Manage Network Object Groups
      • Add Network Object Groups
      • Edit a Network Object Group
      • Manage Details of a Network Object Group
      • Delete a Network Object Group
    • Manage Service Objects
      • Add Service Objects
      • Edit a Service Object
      • Manage Details of a Service Object
      • Delete a Service Object
    • Manage Service Object Groups
      • Add Service Object Groups
      • Edit a Service Object Group
      • Manage Details of a Service Object Group
      • Delete a Service Object Group
  • Manage the Access Policy
    • About the Access Policy
    • Show Additional Data on Your Access Rules
    • Edit the Order of the Rules in Your Access Policy
    • Rule Defaults: Default Settings for Access Rules
    • Global Settings for Access Rules
    • Edit Rule Defaults and Global Settings
    • Edit the Default Access Rules
    • Using Wildcard Masks on Access Rules
  • Get Started With Internet Access Rules
    • Components for Internet Access Rules
    • Default Settings for Internet Access Rules
    • Add an Internet Access Rule
    • About Configuring Sources in Internet Access Rules
    • About Configuring Destinations in Internet Access Rules
    • Ensure Rule Matching for Encrypted Internet Traffic
    • Block Internet Access to Geographic Locations
    • Advanced Application Controls
    • Global Settings for Internet Access Rules
    • About Isolated Destinations
      • Isolate Downgrade
    • Troubleshoot Internet Access Rules
    • Zero Trust Access to Internet Destinations
  • Get Started With Private Access Rules
    • Components for Private Access Rules
    • Default Settings for Private Access Rules
    • Add a Private Access Rule
    • About Configuring Sources in Private Access Rules
    • About Configuring Destinations in Private Access Rules
    • About ZTA Private Access Enforcement
      • Most Specific Match Enforcement Mode
      • Multi-App Match Enforcement Mode
      • Multi-App with Resolved IP Match Enforcement Mode
    • About Endpoint Requirements in Access Rules
    • Allowing Traffic from Users and Devices on the Network
    • Global Settings for Private Access Rules
    • Troubleshoot Private Access Rules
  • Get Started with the Cisco Assistant
    • Add Rules with the Cisco Assistant
    • Cisco Assistant Rule Examples
    • Find Documented Answers with the Cisco Assistant
    • Troubleshoot with the Cisco Assistant
    • Messages Generated by the Cisco Assistant
  • Manage Endpoint Security
    • Endpoint Attributes
  • Manage Zero Trust Access Posture Profiles
    • Add a Client-Based Zero Trust Access Posture Profile
    • Add a Browser-Based Zero Trust Access Posture Profile
  • Manage VPN Connection Posture Profiles
    • Add a VPN Connection Posture Profile
  • Manage IPS Profiles
    • Add a Custom IPS Signature List
  • Manage Security Profiles
    • Security Profiles for Internet Access
    • Add a Security Profile for Internet Access
    • Enable SafeSearch
    • Security Profiles for Private Access
    • Add a Security Profile for Private Access
  • Manage App Risk Profiles
    • Add an App Risk Profile
  • Manage Threat Categories
    • Threat Category Descriptions
    • Add a Threat Category List
    • Dispute a Threat Categorization
  • Manage File Inspection and File Analysis
    • Enable File Inspection
    • Enable File Analysis by Cisco Secure Malware Analytics
    • Test File Inspection for Internet Access
    • Monitor File Inspection and Analysis Activity
    • Troubleshoot File Inspection and Analysis
  • Manage File Type Controls
    • Enable File Type Controls
    • File Types to Block
    • Review File Type Controls Through Reports
  • Manage Notification Pages
    • Preview Notification Pages
    • Create Custom Block and Warn Pages
    • Allow Users to Contact an Administrator
    • Block Page IP Addresses
  • Manage Traffic Decryption
    • Important Information About Do Not Decrypt Lists
    • Add a Do Not Decrypt List for Security Profiles for Internet Access
  • Manage Certificates
    • Certificates for Internet Decryption
    • Install the Cisco Secure Access Root Certificate
    • Add Customer CA Signed Root Certificate
    • View the Cisco Trusted Root Store
    • Manage Certificates for Private Resource Decryption
    • Certificates for Private Resource Decryption
    • Certificates for SAML Authentication
    • Manage SAML Certificates for Service Providers
    • Manage SAML VPN Service Provider Certificate Rotation
    • Manage SAML Certificates for Identity Providers
    • VPN Certificates for User and Device Authentication
    • Manage CA Certificates for VPN Connections
  • Manage the Data Loss Prevention Policy
    • Add a Real Time Rule to the Data Loss Prevention Policy
    • Understand Exclusions in a Real Time Rule
    • Supported Applications
    • Add an SaaS API Rule to the Data Loss Prevention Policy
    • Add an AI Guardrails Rule to the Data Loss Prevention Policy
    • Discovery Scan
    • Edit a Data Loss Prevention Rule
    • Delete a Data Loss Prevention Rule
    • Enable or Disable a Data Loss Prevention Rule
    • Supported File and Form Types
    • Best Practices for the Data Loss Protection Policy
  • Manage Data Classifications
    • Create a Data Classification
    • Copy and Customize a Built-In Data Classification
    • Delete or Edit a Classification
    • Create an Exact Data Match Identifier
    • Index Data for an EDM
    • Exact Data Match Field Types
    • Create an Indexed Document Match Identifier
    • Built-In Data Classifications
  • Built-in Data Identifiers
    • Copy and Customize a Data Identifier
    • Create a Custom Identifier
    • Custom Regular Expression Patterns
    • Individual Data Identifiers
  • Manage AI Guardrails Data Classifications
    • Create an AI Guardrails Data Classification
    • Copy and Customize a Built-In AI Guardrails Data Classification
    • Delete or Edit an AI Guardrails Data Classification
  • Manage Secure ICAP
  • Manage SaaS API Data Loss Prevention
    • Enable SaaS API Data Loss Prevention for AWS Tenants
    • Enable SaaS API Data Loss Prevention for Azure Tenants
    • Enable SaaS API Data Loss Prevention for Box Tenants
    • Enable SaaS API Data Loss Prevention for Dropbox Tenants
    • Enable SaaS API Data Loss Prevention for Google Drive Tenants
    • Enable SaaS API Data Loss Prevention for Microsoft 365 Tenants
    • Enable SaaS API Data Loss Prevention for ServiceNow Tenants
    • Enable SaaS API Data Loss Prevention for Slack Tenants
    • Enable SaaS API Data Loss Prevention for Webex Teams
  • Manage Cloud Malware Protection
    • Enable Cloud Malware Protection
    • Revoke Authorization for a Platform
    • Enable Cloud Malware Protection for AWS Tenants
    • Enable Cloud Malware Protection for Azure Tenants
    • Enable Cloud Malware Protection for Box Tenants
    • Enable Cloud Malware Protection for Dropbox Tenants
    • Enable Cloud Access Security Broker Features for Google Drive
    • Enable Cloud Access Security Broker Protection for Microsoft 365 Tenants
    • Enable Cloud Malware Protection for ServiceNow Tenants
    • Enable Cloud Malware Protection for Slack Tenants
    • Enable Cloud Malware Protection for Webex Teams
  • Manage Logging
    • Enable Logging
    • Enable Logging to Your Own S3 Bucket
    • Enable Logging to a Cisco-managed S3 Bucket
    • Change the Location of Event Data Logs
    • Stop Logging
    • Delete Logs
    • Log Formats and Versioning
      • Reports and CSV Formats
      • Admin Audit Log Formats
      • Cloud Firewall Log Formats
      • Data Loss Prevention (DLP) Log Formats
      • DNS Log Formats
      • File Events Log Formats
      • IPS Log Formats
      • Remote Access VPN Log Formats
      • Web Log Formats
      • Zero Trust Access Log Formats
      • Zero Trust Access Flow Log Formats
  • Manage API Keys
    • Add Secure Access API Keys
    • Add KeyAdmin API Keys
  • Manage Accounts
    • Add a New Account
    • Edit Account Settings
    • Delete an Account
    • Hide Sources with De-identification

DNS Forwarders

  • Get Started with Virtual Appliances
    • Prerequisites for Virtual Appliances
    • Virtual Appliance Deployment Guidelines
    • Virtual Appliance Sizing Guide
  • Manage VAs in Secure Access
    • Configure Authentication for Virtual Appliances
    • Manage DNS Forwarders
    • Manage Site for Virtual Appliance
    • Configure Updates for Virtual Appliances
  • Deploy Virtual Appliances
    • Deploy VAs in Hyper-V for Windows 2012 or Higher
    • Deploy VAs in VMware
    • Deploy VAs in Microsoft Azure
    • Deploy VAs in Amazon Web Services
    • Deploy VAs in Google Cloud Platform
    • Deploy VAs in KVM
    • Deploy VAs in Nutanix
    • Deploy VAs in Alibaba Cloud
  • Configure Virtual Appliances
    • Configure Settings on VAs
  • Local DNS Forwarding
  • Test Virtual Appliance Deployments
  • SNMP Monitoring for Virtual Appliances
  • Troubleshoot Virtual Appliances

Experience Insights

  • About Experience Insights
  • Onboard Experience Insights
    • Generate OAuth Bearer Token
  • Cisco AI Assistant for Experience Insights
  • Configure Experience Insights
  • View Endpoint Performance Map
  • View Summary of Endpoints
  • Wi-Fi Descriptions
  • View Common SaaS Applications
  • View User Dashboard
  • About Endpoint Agent Tests
    • Estimate Peak Traffic to Custom Targets for Default Endpoint Tests
    • Create HTTP Server Tests
    • Create Network Tests
    • View HTTP Server Test Results
    • View Network Test Results

Reports

  • Monitor Secure Access with Reports
    • Export Report Data to CSV
    • Bookmark and Share Reports
    • Report Search Window & Retention
    • Report Scheduling
    • Schedule a Report
    • Update a Scheduled Report
  • Remote Access Log Report
    • View the Remote Access Log Report
  • Activity Search Report
    • View and Customize the Activity Search Report
    • View Firewall Events in Activity Search Report
    • View Web Events in Activity Search Report
    • View Zero Trust Events in Activity Search Report
    • View Activity Search Report Actions
    • Schedule an Activity Search Report
    • Use Search and Advanced Search
  • Security Activity Report
    • View Activity and Details by Filters
    • View Activity and Details by Event Type or Security Category
    • View an Event's Details
    • Search for Security Activity
  • Total Requests Report
  • Activity Volume Report
  • App Discovery Report
    • View the App Discovery Report
    • View the Highest Risk Apps
    • Review Apps in the Apps Grid
    • View App Details
    • Change App Details
    • Control Apps
    • Control Advanced Apps
    • View Traffic Data Through SWG Service
  • Top Destinations Report
    • Destination Details
  • Top Categories Report
    • Category Details
  • Third-Party Apps Report
    • View App Details
  • Cloud Malware Report
  • Data Loss Prevention Report
  • Admin Audit Log Report
    • Export Admin Audit Log Report to an S3 Bucket

Cisco Secure Client

  • Cisco Secure Client Overview
  • Get Started and Manage Client-based Zero Trust Access from Mobile Devices
    • Set up the Zero Trust Access App for iOS Devices
    • Set up the Zero Trust Access App for Android Devices
    • Set up the Zero Trust Access App for Android on Samsung Devices
    • Monitor and Troubleshoot the Zero Trust Access App from Mobile Devices
  • Get Started with Cisco Secure Client on Windows and macOS Devices
    • Prerequisites
    • Download Cisco Secure Client
    • Download the OrgInfo.json File
    • Manual Installation of Cisco Secure Client (Windows and macOS)
    • Mass Deployment Overview
    • Mass Deployment (Windows)
    • Customize Windows Installation of Cisco Secure Client
    • Mass Deployment (macOS)
    • Customize macOS Installation of Cisco Secure Client
    • VPN Headend Deployment
    • Secure Firewall Management Center and Secure Firewall Threat Defense
    • Meraki Systems Manager (SM) Deployment
    • Migration from Umbrella Roaming Client
    • Install the Root Certificate for All Browsers
    • Cloud Management
    • Additional References
    • Remote Monitoring and Management Deployment Tutorials
  • Manage Zero Trust Access using Cisco Secure Client
    • Requirements for Secure Client with Zero Trust Access
    • Invite Users to Enroll in Zero Trust Access for Secure Client
    • Troubleshoot Client-Based Zero Trust Access
    • Unenroll a Device from Zero Trust Access
  • Manage Virtual Private Networks on Cisco Secure Client
    • Download the Virtual Private Network XML Profile
    • CA Certificates for VPN Connections
  • Manage Internet Security on Cisco Secure Client
    • Umbrella Roaming Security Module Requirements
    • Domain Management
    • Interpret Internet Security Diagnostics
    • DNS Protection Status
    • SWG Protection Status

Managed iOS

  • Cisco Security Connector: Secure Access Setup Guide
    • Quick Start
  • Meraki Registration
    • Verify Secure Access with Meraki
    • Meraki Documentation
  • Register an iOS Device Through Apple Configurator 2
  • IBM MaaS360 Registration
  • Intune Registration
  • Jamf Registration
  • MobileIron Registration
    • MobileIron Configuration
  • MobiConnect Registration
  • Workspace ONE Registration
  • Register an iOS Device Through a Generic MDM System
  • Apply an Access Policy to Your Mobile Device
    • Secure Access Reporting
  • Anonymize Devices
  • Export Device Data to CSV
  • Troubleshooting
  • Push the Cisco Root Certificate to Managed Devices
  • Configure Cellular and Wifi Domains
  • Configuring DNS Suffix Whitelisting

Managed Android

  • Secure Access Module for Cisco Secure Client (Android OS)
  • Deploy the Android Client
    • Android Configuration Download
    • Cisco Meraki MDM
    • MobileIron MDM
    • VMware Workspace ONE
    • Microsoft Intune MDM
    • Samsung Knox MDM
    • Push the Cisco Root Certificate to Devices
  • Manage Identities
  • Export Device Data to CSV
  • Troubleshooting
  • Frequently Asked Questions

Unmanaged Mobile Device Protection

  • Unmanaged Mobile Device Protection
  • Administrator Actions
  • End-user Actions

Integrations

  • Manage Third-Party Integrations
    • Chrome Enterprise Browser
  • Integrate ISE (Identity Services Engine) with Secure Access
    • Solution Overview
    • Components and Prerequisites
    • Solution Workflow
    • Connect Cisco ISE and Cisco pxGrid Cloud
    • Enable Cisco Security Cloud Exchange
    • Integrate Cisco ISE with Secure Access
    • Verify and Monitor Context Sharing
  • Integrate Catalyst SD-WAN with Secure Access
    • Solution Overview
    • Components and Prerequisites
    • Solution Workflow
    • Configure Context Sharing Between Catalyst SD-WAN and Secure Access
    • Verify and Monitor Context Sharing

Cisco Security for Chromebook Client

  • About Cisco Security for Chromebooks
  • Prerequisites for Cisco Security for Chromebooks Client
  • Limitations for Cisco Security for Chromebooks
  • Integrate the Google Workspace Identity Service
  • Deploy the Cisco Security for Chromebooks Client
    • Bypass Internal Domains from DNS-over-HTTPS (DoH)
    • Enable Reporting for Private IP Address of Chromebook Device
    • Verify Cisco Security for Chromebooks Client Deployment
    • Export Device Data to CSV
    • Troubleshoot Cisco Security for Chromebooks Client Deployment
  • View Protection Status of Chromebook Devices
  • Add Policies to a Chromebook Device
  • Cisco Security for Chromebooks Client FAQ
  • Google Workspace Identity Service FAQ

draft-rg-9-26-23-Manage Security Profiles

Private Preview

Created this as a new top-level organzing page created for the Secure Access > Profiles bucket. (RG)

Manage Endpoint Security

Manage IPS Profiles

Manage Web Profiles


Best Practices for the Data Loss Prevention Profile < Manage Security Profiles > Manage Endpoint Security

Updated over 1 year ago