Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Cisco Secure Access China User Guide

  • Cisco Secure Access China Help
    • Introduction to Cisco Secure Access China
      • Welcome to Cisco Secure Access China
        • Sign into Secure Access China with Security Cloud Sign On
        • Find Your Organization ID
        • Determine Your Current Package
      • Secure Access China Single Sign-On Authentication
        • Configure Single Sign-On Authentication
        • Troubleshoot Single Sign On Authentication
      • Secure Access Regions
    • Getting Started
      • Get Started
        • Begin Secure Access Onboarding Workflow
        • Step 1 – Configure Network Connections
        • Step 2 – Configure Access to Resources
        • Step 3 - Configure End User Connectivity
        • Step 4 – Configure Endpoints and Network Sources
        • Secure Access China Overview
      • Quickstarts
        • Quickstart – Cisco Secure Client with Virtual Private Network
        • Quickstart – Cisco Secure Client with Internet Security
        • Quickstart – Browser with SAML Authentication
      • Limitations and Range Limits
      • Network Requirements for Secure Access China
      • Manage Network Connections
    • Manage Network Tunnel Groups
      • Manage Network Tunnel Groups
        • Device Compatibility and Network Tunnels
        • Add a Network Tunnel Group
        • View Network Tunnel Group Details
        • Edit a Network Tunnel Group
        • Delete a Network Tunnel Group
        • Supported IPsec Parameters
    • Network Tunnel Configuration
      • Network Tunnel Configuration
        • Configure Tunnels with Catalyst SD-WAN cEdge and vEdge
        • Configure Tunnels with Cisco ISR
        • Configure Tunnels with Cisco Adaptive Security Appliance
        • Configure Tunnels with Cisco Secure Firewall
        • Configure Tunnels with Meraki MX
    • Manage Users and Groups
      • Manage Users and Groups
        • View User Details
        • View Group Details
        • Provision Token for Identity Provider
        • Import Users and Groups from CSV File
        • Provision Users and Groups from Okta
        • Provision Users and Groups from Azure
    • Provision Users and Groups from Active Directory
      • Provision Users and Groups from Active Directory
        • Prerequisites for AD Connectors
        • Connect Multiple Active Directory Domains
        • Manage AD Components
          • Add AD Components in Secure Access China
          • Manage Sites for AD Components
          • View AD Components in Secure Access China
          • Delete AD Components
        • Manage AD Connectors
          • Configure Authentication for AD Connectors
          • Configure Updates on AD Connectors
          • Connect Active Directory to Secure Access
          • Deploy LDIF Files for AD Connector
          • Change the Connector Account Password
        • AD Connector Communication Flow and Troubleshooting
    • Configure Integrations with SAML Identity Providers
      • Configure Integrations with SAML Identity Providers
        • Prerequisites for SAML Authentication
        • Configure Azure AD for SAML
        • Configure Okta for SAML
        • Configure AD FS for SAML
        • Configure Duo Security for SAML
        • Configure Ping Identity for SAML
        • Configure OpenAM for SAML
        • SAML Certificate Renewal Options
        • Test SAML Identity Provider Integration
        • Delete SAML Identity Provider Integration
    • Manage End-User Connectivity
      • Manage End-User Connectivity
    • Manage DNS Servers
      • Manage DNS Servers
    • Manage Remote Access Virtual Private Networks
      • Manage Remote Access Virtual Private Networks
        • FQDNs for Network Connections
        • Manage IP Pools
        • Add an IP Pool
        • Manage VPN Profiles
        • Add VPN Profiles
        • Manage Machine Tunnels
    • Manage PAC Files
      • Manage PAC Files
        • Deploy the Secure Access PAC File for Windows
        • Deploy the Secure Access PAC File for macOS
        • Customize the Secure Access PAC File
    • Manage Internet Security
      • Manage Internet Security
        • Set Up Internet Security on User Devices
        • Manage Internet Security Bypass
          • Add Destinations for Internet Security Bypass
          • Edit Destinations for Internet Security Bypass
          • Delete Destination for Internet Security Bypass
        • Configure Cisco Secure Client Settings
    • Manage Resources
      • Manage Resources
    • Manage Registered Networks
      • Manage Registered Networks
        • Add Network Resources
        • Update a Network Resource
        • Delete a Network Resource
    • Manage Internal Networks
      • Manage Internal Networks
        • Add Internal Network Resources
        • Update an Internal Network Resource
        • Delete an Internal Network Resource
    • Manage Destination Lists
      • Manage Destination Lists
        • Add a Destination List
        • Upload Destinations From a File
        • Edit a Destination List
        • Download Destinations to a CSV File
        • Control Access to Custom URLs
        • Wildcards in Destination Lists
        • Add Punycode Domain Name to Destination List
        • Troubleshoot Destination Lists
    • Manage AAA Servers
      • Manage AAA Servers
    • Manage Application Lists
      • Manage Application Lists
        • Add an Application List
        • Application Categories
        • Delete an Application List
    • Manage Content Category Lists
      • Manage Content Category Lists
        • Available Content Categories
        • Add a Content Category List
        • Request a Category for an Uncategorized Destination
        • Dispute a Content Category
        • View Content Categories in Reports
    • Manage Tenant Control Profiles
      • Manage Tenant Control Profiles
        • Add a Tenant Controls Profile
        • Control Cloud Access to Dropbox
        • Control Cloud Access to Google G Suite
        • Control Cloud Access to Microsoft 365
        • Control Cloud Access to Slack
        • Use Tenant Controls in Access Rules
        • Review Tenant Controls Through Reports
    • Manage Roaming Devices
      • Manage Roaming Devices
        • View Internet Security Settings for Roaming Devices
        • Edit Internet Security Settings for Roaming Devices
        • Delete a Roaming Device
    • Manage Private Resources
      • Manage Private Resources
        • Add a Private Resource
        • Add a Private Resource Group
    • Manage Connections to Private Destinations
      • Manage Connections to Private Destinations
        • Manage Branch Connections
    • Manage the Access Policy
      • Manage the Access Policy
        • About the Access Policy
        • Show Additional Data on Your Access Rules
        • Edit the Order of the Rules in Your Access Policy
        • Rule Defaults: Default Settings for Access Rules
        • Global Settings for Access Rules
        • Edit Rule Defaults and Global Settings
        • Edit the Default Access Rules
    • Get Started With Internet Access Rules
      • Get Started With Internet Access Rules
        • Components for Internet Access Rules
        • Default Settings for Internet Access Rules
        • Add an Internet Access Rule
        • About Configuring Sources in Internet Access Rules
        • About Configuring Destinations in Internet Access Rules
        • Advanced Application Controls
        • Global Settings for Internet Access Rules
        • Troubleshoot Internet Access Rules
    • Get Started With Private Access Rules
      • Get Started With Private Access Rules
        • Components for Private Access Rules
        • Default Settings for Private Access Rules
        • Add a Private Access Rule
        • About Configuring Sources in Private Access Rules
        • About Configuring Destinations in Private Access Rules
        • About Endpoint Requirements in Access Rules
        • Allowing Traffic from Users and Devices on the Network
        • Global Settings for Private Access Rules
        • Troubleshoot Private Access Rules
    • Manage Endpoint Security
      • Manage Endpoint Security
        • Endpoint Attributes
    • Manage VPN Connection Posture Profiles
      • Manage VPN Connection Posture Profiles
        • Add a VPN Connection Posture Profile
    • Manage IPS Profiles
      • Manage IPS Profiles
    • Manage Web Profiles
      • Manage Web Profiles
        • Add a Web Profile
      • Enable SafeSearch
    • Manage Threat Categories
      • Manage Threat Categories
        • Threat Category Descriptions
        • Add a Threat Category List
        • Dispute a Threat Categorization
    • Manage File Inspection
      • Manage File Inspection
        • Enable File Inspection
        • Test File Inspection
        • Monitor File Inspection Activity
        • Troubleshoot and Monitor File Inspection
    • Manage File Type Controls
      • Manage File Type Controls
        • Enable File Type Controls
        • File Types to Block
        • Review File Type Controls Through Reports
    • Manage Notification Pages
      • Manage Notification Pages
        • Preview Notification Pages
        • Create Custom Block and Warn Pages
        • Allow Users to Contact an Administrator
    • Manage Traffic Decryption
      • Manage Traffic Decryption
        • Important Information About Do Not Decrypt Lists
        • Add a Do Not Decrypt List for Web Profiles
    • Manage Certificates
      • Manage Certificates
        • Certificates for Internet Decryption
        • Install the Cisco Secure Access Root Certificate
        • Add Customer CA Signed Root Certificate
        • View the Cisco Trusted Root Store
        • Manage Certificates for Private Resource Decryption
        • Certificates for Private Resource Decryption
        • Certificates for SAML Authentication
        • Manage SAML Certificates for Service Providers
        • Manage SAML Certificates for Identity Providers
        • VPN Certificates for User and Device Authentication
        • Manage CA Certificates for VPN Connections
    • Manage the Data Loss Prevention Policy
      • Manage the Data Loss Prevention Policy
        • Add a Real Time Rule to the Data Loss Prevention Policy
        • Understand Exclusions in a Real Time Rule
        • Supported Applications
        • Discovery Scan
        • Edit a Data Loss Prevention Rule
        • Delete a Data Loss Prevention Rule
        • Enable or Disable a Data Loss Prevention Rule
        • Supported File and Form Types
        • Best Practices for the Data Loss Protection Policy
    • Manage Data Classifications
      • Manage Data Classifications
        • Add a Data Classification
        • Copy and Customize a Built-In Data Classification
        • Delete or Edit a Classification
        • Create an Exact Data Match Identifier
        • Index Data for an EDM
        • Exact Data Match Field Types
        • Create an Indexed Document Match Identifier
    • Built-in Data Identifiers
      • Built-in Data Identifiers
        • Copy and Customize a Data Identifier
        • Create a Custom Dictionary
        • Custom Regular Expression Patterns
        • Individual Data Identifiers
    • Manage Logging
      • Manage Logging
        • Enable Logging
        • Enable Logging to Your Own S3 Bucket
        • Enable Logging to a Cisco-managed S3 Bucket
        • Stop Logging
        • Delete Logs
        • Log Formats and Versioning
          • Admin Audit Log Formats
          • Cloud Firewall Log Formats
          • Data Loss Prevention (DLP) Log Formats
          • IPS Log Formats
          • Remote Access VPN Log Formats
          • Web Log Formats
    • Manage API Keys
      • Manage API Keys
        • Add Secure Access API Keys
        • Add KeyAdmin API Keys
    • Manage Accounts
      • Manage Accounts
        • Add a New Account
        • Edit Account Settings
        • Delete an Account
        • Hide Sources with De-identification
  • Cisco Secure Client
    • Get Started with Cisco Secure Client on Windows and macOS
      • Get Started with Cisco Secure Client on Windows and macOS
        • Prerequisites
        • Download Cisco Secure Client
        • Download the OrgInfo.json File
        • Manual Installation of Cisco Secure Client (Windows and macOS)
        • Mass Deployment Overview
        • Mass Deployment (Windows)
          • Automated Installation (Windows)
        • Multi Deployment Support
          • Manage Device Deployment
        • Customize Windows Installation of Cisco Secure Client
        • Mass Deployment (macOS)
          • Automated Installation (macOS)
        • Customize macOS Installation of Cisco Secure Client
        • VPN Headend Deployment
        • Secure Firewall Management Center and Secure Firewall Threat Defense
        • Meraki Systems Manager (SM) Deployment
        • Migration from Umbrella Roaming Client
        • Install the Root Certificate for All Browsers
        • Cloud Management
        • Additional References
        • Remote Monitoring and Management Deployment Tutorials
    • Manage Internet Security on Cisco Secure Client
      • Manage Internet Security on Cisco Secure Client
        • Download the OrgInfo.json File
        • Umbrella Roaming Security Module Requirements
        • Domain Management
        • Interpret Internet Security Diagnostics
        • Customize Windows Installation of Cisco Secure Client
        • Customize macOS Installation of Cisco Secure Client
    • Manage Virtual Private Networks on Cisco Secure Client
      • Manage Virtual Private Networks on Cisco Secure Client
        • Download the Virtual Private Network XML Profile
        • CA Certificates for VPN Connections
  • Reports
    • Monitor Secure Access with Reports
      • Monitor Secure Access China with Reports
        • Export Report Data to CSV
        • Bookmark and Share Reports
        • Report Retention
        • Schedule a Report
        • Update a Scheduled Report
        • Report Scheduling
    • Remote Access Log Report
      • Remote Access Log Report
        • View the Remote Access Log Report
    • Activity Search Report
      • Activity Search Report
        • View the Activity Search Report
        • View Activity Search Report Actions
        • Schedule an Activity Search Report
        • Use Search and Advanced Search
    • Security Activity Report
      • Security Activity Report
        • View Activity and Details by Filters
        • View Activity and Details by Event Type or Security Category
        • View an Event's Details
        • Search for Security Activity
    • Total Requests Report
      • Total Requests Report
    • Activity Volume Report
      • Activity Volume Report
    • App Discovery Report
      • App Discovery Report
        • View the App Discovery Report
        • View the Highest Risk Apps
        • Review Apps in the Apps Grid
        • View App Details
        • Change App Details
        • Control Apps
        • Control Advanced Apps
        • View Traffic Data Through SWG Service
    • Top Destinations Report
      • Top Destinations Report
        • Destination Details
    • Top Categories Report
      • Top Categories Report
        • Category Details
    • Data Loss Prevention Report
      • Data Loss Prevention Report
    • Admin Audit Log Report
      • Admin Audit Log Report
        • Export Admin Audit Log Report to an S3 Bucket

Cisco Secure Access China Help Manage Logging Manage Logging Log Formats and Versioning Cloud Firewall Log Formats

Last updated: Jan 16, 2026

Previous topic Admin Audit Log Formats Next topic Data Loss Prevention (DLP) Log Formats
© 2026 Cisco System, Inc.
Privacy policyTerms of Service