Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Cisco Secure Access China User Guide

  • Cisco Secure Access China Help
    • Introduction to Cisco Secure Access China
      • Welcome to Cisco Secure Access China
        • Sign into Secure Access China with Security Cloud Sign On
        • Find Your Organization ID
        • Determine Your Current Package
      • Secure Access China Single Sign-On Authentication
        • Configure Single Sign-On Authentication
        • Troubleshoot Single Sign On Authentication
      • Secure Access Regions
    • Getting Started
      • Get Started
        • Begin Secure Access Onboarding Workflow
        • Step 1 – Configure Network Connections
        • Step 2 – Configure Access to Resources
        • Step 3 - Configure End User Connectivity
        • Step 4 – Configure Endpoints and Network Sources
        • Secure Access China Overview
      • Quickstarts
        • Quickstart – Cisco Secure Client with Virtual Private Network
        • Quickstart – Cisco Secure Client with Internet Security
        • Quickstart – Browser with SAML Authentication
      • Limitations and Range Limits
      • Network Requirements for Secure Access China
      • Manage Network Connections
    • Manage Network Tunnel Groups
      • Manage Network Tunnel Groups
        • Device Compatibility and Network Tunnels
        • Add a Network Tunnel Group
        • View Network Tunnel Group Details
        • Edit a Network Tunnel Group
        • Delete a Network Tunnel Group
        • Supported IPsec Parameters
    • Network Tunnel Configuration
      • Network Tunnel Configuration
        • Configure Tunnels with Catalyst SD-WAN cEdge and vEdge
        • Configure Tunnels with Cisco ISR
        • Configure Tunnels with Cisco Adaptive Security Appliance
        • Configure Tunnels with Cisco Secure Firewall
        • Configure Tunnels with Meraki MX
    • Manage Users and Groups
      • Manage Users and Groups
        • View User Details
        • View Group Details
        • Provision Token for Identity Provider
        • Import Users and Groups from CSV File
        • Provision Users and Groups from Okta
        • Provision Users and Groups from Azure
    • Provision Users and Groups from Active Directory
      • Provision Users and Groups from Active Directory
        • Prerequisites for AD Connectors
        • Connect Multiple Active Directory Domains
        • Manage AD Components
          • Add AD Components in Secure Access China
          • Manage Sites for AD Components
          • View AD Components in Secure Access China
          • Delete AD Components
        • Manage AD Connectors
          • Configure Authentication for AD Connectors
          • Configure Updates on AD Connectors
          • Connect Active Directory to Secure Access
          • Deploy LDIF Files for AD Connector
          • Change the Connector Account Password
        • AD Connector Communication Flow and Troubleshooting
    • Configure Integrations with SAML Identity Providers
      • Configure Integrations with SAML Identity Providers
        • Prerequisites for SAML Authentication
        • Configure Azure AD for SAML
        • Configure Okta for SAML
        • Configure AD FS for SAML
        • Configure Duo Security for SAML
        • Configure Ping Identity for SAML
        • Configure OpenAM for SAML
        • SAML Certificate Renewal Options
        • Test SAML Identity Provider Integration
        • Delete SAML Identity Provider Integration
    • Manage End-User Connectivity
      • Manage End-User Connectivity
    • Manage DNS Servers
      • Manage DNS Servers
    • Manage Remote Access Virtual Private Networks
      • Manage Remote Access Virtual Private Networks
        • FQDNs for Network Connections
        • Manage IP Pools
        • Add an IP Pool
        • Manage VPN Profiles
        • Add VPN Profiles
        • Manage Machine Tunnels
    • Manage PAC Files
      • Manage PAC Files
        • Deploy the Secure Access PAC File for Windows
        • Deploy the Secure Access PAC File for macOS
        • Customize the Secure Access PAC File
    • Manage Internet Security
      • Manage Internet Security
        • Set Up Internet Security on User Devices
        • Manage Internet Security Bypass
          • Add Destinations for Internet Security Bypass
          • Edit Destinations for Internet Security Bypass
          • Delete Destination for Internet Security Bypass
        • Configure Cisco Secure Client Settings
    • Manage Resources
      • Manage Resources
    • Manage Registered Networks
      • Manage Registered Networks
        • Add Network Resources
        • Update a Network Resource
        • Delete a Network Resource
    • Manage Internal Networks
      • Manage Internal Networks
        • Add Internal Network Resources
        • Update an Internal Network Resource
        • Delete an Internal Network Resource
    • Manage Destination Lists
      • Manage Destination Lists
        • Add a Destination List
        • Upload Destinations From a File
        • Edit a Destination List
        • Download Destinations to a CSV File
        • Control Access to Custom URLs
        • Wildcards in Destination Lists
        • Add Punycode Domain Name to Destination List
        • Troubleshoot Destination Lists
    • Manage AAA Servers
      • Manage AAA Servers
    • Manage Application Lists
      • Manage Application Lists
        • Add an Application List
        • Application Categories
        • Delete an Application List
    • Manage Content Category Lists
      • Manage Content Category Lists
        • Available Content Categories
        • Add a Content Category List
        • Request a Category for an Uncategorized Destination
        • Dispute a Content Category
        • View Content Categories in Reports
    • Manage Tenant Control Profiles
      • Manage Tenant Control Profiles
        • Add a Tenant Controls Profile
        • Control Cloud Access to Dropbox
        • Control Cloud Access to Google G Suite
        • Control Cloud Access to Microsoft 365
        • Control Cloud Access to Slack
        • Use Tenant Controls in Access Rules
        • Review Tenant Controls Through Reports
    • Manage Roaming Devices
      • Manage Roaming Devices
        • View Internet Security Settings for Roaming Devices
        • Edit Internet Security Settings for Roaming Devices
        • Delete a Roaming Device
    • Manage Private Resources
      • Manage Private Resources
        • Add a Private Resource
        • Add a Private Resource Group
    • Manage Connections to Private Destinations
      • Manage Connections to Private Destinations
        • Manage Branch Connections
    • Manage the Access Policy
      • Manage the Access Policy
        • About the Access Policy
        • Show Additional Data on Your Access Rules
        • Edit the Order of the Rules in Your Access Policy
        • Rule Defaults: Default Settings for Access Rules
        • Global Settings for Access Rules
        • Edit Rule Defaults and Global Settings
        • Edit the Default Access Rules
    • Get Started With Internet Access Rules
      • Get Started With Internet Access Rules
        • Components for Internet Access Rules
        • Default Settings for Internet Access Rules
        • Add an Internet Access Rule
        • About Configuring Sources in Internet Access Rules
        • About Configuring Destinations in Internet Access Rules
        • Advanced Application Controls
        • Global Settings for Internet Access Rules
        • Troubleshoot Internet Access Rules
    • Get Started With Private Access Rules
      • Get Started With Private Access Rules
        • Components for Private Access Rules
        • Default Settings for Private Access Rules
        • Add a Private Access Rule
        • About Configuring Sources in Private Access Rules
        • About Configuring Destinations in Private Access Rules
        • About Endpoint Requirements in Access Rules
        • Allowing Traffic from Users and Devices on the Network
        • Global Settings for Private Access Rules
        • Troubleshoot Private Access Rules
    • Manage Endpoint Security
      • Manage Endpoint Security
        • Endpoint Attributes
    • Manage VPN Connection Posture Profiles
      • Manage VPN Connection Posture Profiles
        • Add a VPN Connection Posture Profile
    • Manage IPS Profiles
      • Manage IPS Profiles
    • Manage Web Profiles
      • Manage Web Profiles
        • Add a Web Profile
      • Enable SafeSearch
    • Manage Threat Categories
      • Manage Threat Categories
        • Threat Category Descriptions
        • Add a Threat Category List
        • Dispute a Threat Categorization
    • Manage File Inspection
      • Manage File Inspection
        • Enable File Inspection
        • Test File Inspection
        • Monitor File Inspection Activity
        • Troubleshoot and Monitor File Inspection
    • Manage File Type Controls
      • Manage File Type Controls
        • Enable File Type Controls
        • File Types to Block
        • Review File Type Controls Through Reports
    • Manage Notification Pages
      • Manage Notification Pages
        • Preview Notification Pages
        • Create Custom Block and Warn Pages
        • Allow Users to Contact an Administrator
    • Manage Traffic Decryption
      • Manage Traffic Decryption
        • Important Information About Do Not Decrypt Lists
        • Add a Do Not Decrypt List for Web Profiles
    • Manage Certificates
      • Manage Certificates
        • Certificates for Internet Decryption
        • Install the Cisco Secure Access Root Certificate
        • Add Customer CA Signed Root Certificate
        • View the Cisco Trusted Root Store
        • Manage Certificates for Private Resource Decryption
        • Certificates for Private Resource Decryption
        • Certificates for SAML Authentication
        • Manage SAML Certificates for Service Providers
        • Manage SAML Certificates for Identity Providers
        • VPN Certificates for User and Device Authentication
        • Manage CA Certificates for VPN Connections
    • Manage the Data Loss Prevention Policy
      • Manage the Data Loss Prevention Policy
        • Add a Real Time Rule to the Data Loss Prevention Policy
        • Understand Exclusions in a Real Time Rule
        • Supported Applications
        • Discovery Scan
        • Edit a Data Loss Prevention Rule
        • Delete a Data Loss Prevention Rule
        • Enable or Disable a Data Loss Prevention Rule
        • Supported File and Form Types
        • Best Practices for the Data Loss Protection Policy
    • Manage Data Classifications
      • Manage Data Classifications
        • Add a Data Classification
        • Copy and Customize a Built-In Data Classification
        • Delete or Edit a Classification
        • Create an Exact Data Match Identifier
        • Index Data for an EDM
        • Exact Data Match Field Types
        • Create an Indexed Document Match Identifier
    • Built-in Data Identifiers
      • Built-in Data Identifiers
        • Copy and Customize a Data Identifier
        • Create a Custom Dictionary
        • Custom Regular Expression Patterns
        • Individual Data Identifiers
    • Manage Logging
      • Manage Logging
        • Enable Logging
        • Enable Logging to Your Own S3 Bucket
        • Enable Logging to a Cisco-managed S3 Bucket
        • Stop Logging
        • Delete Logs
        • Log Formats and Versioning
          • Admin Audit Log Formats
          • Cloud Firewall Log Formats
          • Data Loss Prevention (DLP) Log Formats
          • IPS Log Formats
          • Remote Access VPN Log Formats
          • Web Log Formats
    • Manage API Keys
      • Manage API Keys
        • Add Secure Access API Keys
        • Add KeyAdmin API Keys
    • Manage Accounts
      • Manage Accounts
        • Add a New Account
        • Edit Account Settings
        • Delete an Account
        • Hide Sources with De-identification
  • Cisco Secure Client
    • Get Started with Cisco Secure Client on Windows and macOS
      • Get Started with Cisco Secure Client on Windows and macOS
        • Prerequisites
        • Download Cisco Secure Client
        • Download the OrgInfo.json File
        • Manual Installation of Cisco Secure Client (Windows and macOS)
        • Mass Deployment Overview
        • Mass Deployment (Windows)
          • Automated Installation (Windows)
        • Multi Deployment Support
          • Manage Device Deployment
        • Customize Windows Installation of Cisco Secure Client
        • Mass Deployment (macOS)
          • Automated Installation (macOS)
        • Customize macOS Installation of Cisco Secure Client
        • VPN Headend Deployment
        • Secure Firewall Management Center and Secure Firewall Threat Defense
        • Meraki Systems Manager (SM) Deployment
        • Migration from Umbrella Roaming Client
        • Install the Root Certificate for All Browsers
        • Cloud Management
        • Additional References
        • Remote Monitoring and Management Deployment Tutorials
    • Manage Internet Security on Cisco Secure Client
      • Manage Internet Security on Cisco Secure Client
        • Download the OrgInfo.json File
        • Umbrella Roaming Security Module Requirements
        • Domain Management
        • Interpret Internet Security Diagnostics
        • Customize Windows Installation of Cisco Secure Client
        • Customize macOS Installation of Cisco Secure Client
    • Manage Virtual Private Networks on Cisco Secure Client
      • Manage Virtual Private Networks on Cisco Secure Client
        • Download the Virtual Private Network XML Profile
        • CA Certificates for VPN Connections
  • Reports
    • Monitor Secure Access with Reports
      • Monitor Secure Access China with Reports
        • Export Report Data to CSV
        • Bookmark and Share Reports
        • Report Retention
        • Schedule a Report
        • Update a Scheduled Report
        • Report Scheduling
    • Remote Access Log Report
      • Remote Access Log Report
        • View the Remote Access Log Report
    • Activity Search Report
      • Activity Search Report
        • View the Activity Search Report
        • View Activity Search Report Actions
        • Schedule an Activity Search Report
        • Use Search and Advanced Search
    • Security Activity Report
      • Security Activity Report
        • View Activity and Details by Filters
        • View Activity and Details by Event Type or Security Category
        • View an Event's Details
        • Search for Security Activity
    • Total Requests Report
      • Total Requests Report
    • Activity Volume Report
      • Activity Volume Report
    • App Discovery Report
      • App Discovery Report
        • View the App Discovery Report
        • View the Highest Risk Apps
        • Review Apps in the Apps Grid
        • View App Details
        • Change App Details
        • Control Apps
        • Control Advanced Apps
        • View Traffic Data Through SWG Service
    • Top Destinations Report
      • Top Destinations Report
        • Destination Details
    • Top Categories Report
      • Top Categories Report
        • Category Details
    • Data Loss Prevention Report
      • Data Loss Prevention Report
    • Admin Audit Log Report
      • Admin Audit Log Report
        • Export Admin Audit Log Report to an S3 Bucket

Cisco Secure Client Get Started with Cisco Secure Client on Windows and macOS Get Started with Cisco Secure Client on Windows and macOS Download Cisco Secure Client

Last updated: Jan 16, 2026

Previous topic Prerequisites Next topic Download the OrgInfo.json File
© 2026 Cisco System, Inc.
Privacy policyTerms of Service