Manage Zero Trust Access using Cisco Secure Client
Zero Trust Access means that no one is trusted by default, whether inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. Enrolling in Zero Trust Access implies an enhanced level of security that reduces the attack surface by ensuring that only authenticated and authorized users and devices can access specific resources. This method aligns well with cloud adoption, remote work, and mobile device usage by securing access regardless of location.
To use Cisco Secure Client with Zero Trust Access on supported devices, a user must enroll the client in Zero Trust Access.
1. Install Cisco Secure Client
See Get Started with Cisco Secure Client on Windows and macOS Devices.
A Secure Client module may require the deployment of a certain profile to run module successfully. A system configuration manager or remote monitoring and management (RMM) system can download, install, and deploy the Secure Client on an organization's user devices. For more information about the Secure Client, see Cisco Secure Client (including AnyConnect) Administrator Guide, Release 5.1.
2. Enroll in Zero Trust Access
Before users can access resources using client-based Zero Trust Access, they must first enroll.
Note: Zero Trust Network Access (ZTNA) does not support multi-user macOS machines. If you use macOS and have Duo Security enabled, Duo may overwrite some states.
For enrollment options, see Choose Zero Trust Access Enrollment Methods for Your Organization. Once you successfully enroll, we strongly recommend creating a Zero Trust Access posture profile. See Quickstart – Cisco Secure Client with Zero Trust Access for more information.
Manage Device Deployment < Manage Zero Trust Access on Cisco Secure Client > Requirements for Secure Client with Zero Trust Access
Updated 18 days ago