Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Cisco Secure Access for Government Help

  • Cisco Secure Access for Government Help
    • Welcome to Cisco Secure Access for Government
      • Sign into Secure Access with Security Cloud Sign On
      • Find Your Organization ID
      • Determine Your Current Package
      • Contact Cisco Secure Access Support
    • Secure Access Single Sign-On Authentication
      • Configure Single Sign-On Authentication
      • Troubleshoot Single Sign On Authentication
    • Get Started
      • Begin Secure Access Onboarding Workflow
      • Step 1 – Configure Network Connections
      • Step 2 – Configure Access to Resources
      • Step 3 - Configure End User Connectivity
      • Step 4 – Configure Endpoints and Network Sources
      • Secure Access Overview Dashboard
        • Get Started Workflow
        • Connectivity
        • Data Transfer
        • Security
        • Users and Groups
        • Private Resources
    • Quickstarts
      • Quickstart – Cisco Secure Client with Zero Trust Access
      • Quickstart – Cisco Secure Client with Virtual Private Network
      • Quickstart – Cisco Secure Client with Internet Security
      • Quickstart – Browser with SAML Authentication
      • Quickstart – Bring Your Own Device with Zero Trust
    • Secure Access Integration with Protective DNS
      • Procedure for Integrating Secure Access with Protective DNS
    • Limitations and Range Limits
    • Network Requirements for Secure Access
      • Secure Access DNS Resolvers
        • Best Practices
        • Cisco Secure Client
        • Cisco Secure Client and External DNS Resolution
      • Secure Access Encrypted DNS Queries
      • Secure Access DNS, Web, and Block Pages
      • Secure Access DNS and Web – Client Configuration Services
        • Windows Only
      • Secure Access DNS and Web – Client Sync Services
      • Secure Access DNS and Web – Client Certificate Revocation Services
      • Cisco Secure Client and Captive Portal Detection
      • Cisco Secure Client and Device Hostnames
      • Transport Layer Security Protocol Requirements
      • Secure Access Secure Web Gateway Services
        • Ingress IP Addresses for the Secure Web Gateway
      • Secure Access SaaS Tenants
      • Secure Access SAML Gateway Services
      • Secure Access SAML Identity Provider Domains
      • Secure Access SAML Gateway Client Certificate Revocation Services
      • Secure Access VPN Services
      • Secure Access VPN Client Certificate Revocation Services
      • Secure Access Zero Trust Client-Based Enrollment Services
      • Secure Access Zero Trust Client-Based Proxy Services
      • Secure Access Zero Trust Client-Based Proxy – Client Certificate Revocation Services
      • Secure Access Zero Trust Proxy Services – Unmanaged Devices
    • Manage Network Connections
      • IPsec Network Tunnels
      • Network Connection Method
        • Network Tunnels (Deployed in Network Tunnel Groups)
    • Manage Network Tunnel Groups
      • Device Compatibility and Network Tunnels
        • IPsec Tunnel Requirements
        • Supported Devices for Setting Up IPsec Tunnels
      • Add a Network Tunnel Group
        • Guidelines for Network Tunnel Groups
        • Procedure
          • Configure Tunnel on Network Device
          • Verify Tunnel Traffic in Secure Access
      • Delete a Network Tunnel Group
        • Procedure
      • Edit a Network Tunnel Group
        • Procedure
      • View Network Tunnel Group Details
        • Prerequisites
        • Procedure
      • Supported IPsec Parameters
    • Network Tunnel Configuration
      • Establish a Tunnel
        • Maximum Transmission Unit (MTU) Size
        • Tunnel Size
        • Client Reachable Prefixes
        • Throughput and Multiple Tunnels
      • Configure Tunnels with Cisco ISR
        • Licensing and Hardware
        • Network Access
        • Configure Tunnels in Secure Access
        • Configure ISR (G2, 4K) or CSR
      • Test Your Configuration
      • Manually Trigger the Tunnel
      • Verify Tunnel Status
      • Configure Tunnels with Cisco Secure Firewall
        • Configure Firepower Policy-based VPN
          • Configure Tunnels in Secure Access
          • Add Network Object
          • Add Traffic Selector ACL
          • Configure Site-to-Site VPN
          • Configure NAT Policy
          • Configure Access Policy
        • Configure Firepower VTI, PBR, and Per Tunnel Identity
          • Configure Tunnels in Secure Access
          • Configure Site-to-Site VPN
          • Configure Policy-based Routing
          • Configure Access Policy
        • Troubleshooting
          • Enable Logging for Debugging
      • Configure Tunnels with Meraki MX
        • Caveats and Considerations
        • Supported Use Cases and Requirements
          • Remote Access VPN and ZTA
          • Branch-to-Branch through Secure Access
          • Secure Internet Access with Non-Meraki VPN
        • Step 1: Add a Network Tunnel Group in Secure Access
        • Step 2: Configure a Tunnel in Meraki MX
        • Verification and Troubleshooting
        • Optional Configurations
      • Configure Tunnels with Cisco Adaptive Security Appliance
        • Licensing and Hardware
        • Network Access
        • Configure Tunnels in Secure Access
        • Configure ASA
        • Test and Verify
      • Configure Tunnels with Catalyst SD-WAN cEdge and vEdge
        • Configure Tunnel in Secure Access
        • Configure Cisco Catalyst SD-WAN Templates
          • Define the Feature Template
          • Add the IPsec Interface Template
        • Configure Static Routes
        • Verify Tunnel Status
    • Secure Access Regions
    • Provision Users and Groups from Active Directory
      • Prerequisites for AD Connectors
      • Connect Multiple Active Directory Domains
      • Change the Connector Account Password
      • Manage AD Components
        • Add AD Components in Secure Access
          • Verify Auditing of Logon Events on Domain Controllers
          • Download the Windows Configuration Script for Domain Controllers
          • Run the Windows Configuration Script for the Domain Controllers
          • Add a Domain Controller in Secure Access
          • Add a Domain in Secure Access
        • Manage Sites for AD Components
        • View AD Components in Secure Access
        • Delete AD Components
          • Delete an AD Component
          • Remove All AD Components
      • Manage AD Connectors
        • Configure Authentication for AD Connectors and VAs
          • How to Set Up Your API Credentials
            • Step 1 – Create the Key Admin API Key Credentials
            • Step 2 – Add the Key Admin API Key Credentials
          • Refresh Client API Key and Secret
          • Reset Client API Key
        • Configure Updates on AD Connectors
        • Connect Active Directory to Secure Access
          • Step 1 – Download the Active Directory Connector
          • Step 2 - Install the Active Directory Connector
        • (Optional) Specify AD Groups in Selective Sync File
          • Rename Selective Sync File After Upgrading to AD Connector v1.14.4
          • Create AD Groups in a Selective Sync File
        • Deploy LDIF Files for AD Connector
          • Step 1 – Download the Active Directory Connector
          • Step 2 – Install the Cisco AD Connector
          • Step 3 – Deploy the LDIF Source Files
          • Troubleshooting
        • Change the Connector Account Password
      • AD Connector Communication Flow and Troubleshooting
        • Communication Flow
        • Troubleshooting
      • Connect Active Directory to Secure Access
        • Step 1 – Choose a Provisioning Method
        • Step 2 – Register a Domain Controller or Domain in Secure Access
          • Register a Domain Controller
          • Register a Domain
        • Step 3 – Download the Cisco AD Connector from Secure Access
        • Step 4 - Install the Cisco AD Connector
        • Best Practices for Synchronizing Active Directory Groups and Organizational Units
      • AD Integration with Virtual Appliances
        • Prerequisites for AD Connectors and VAs
        • Prepare Your AD Environment
          • About the AD Connector and Logon Events
          • Prerequisites
          • Integrate AD with Domain Controllers
            • Support for Multiple AD Domains and AD Forests
            • Verify Auditing of Logon Events on Domain Controllers
            • Download the Windows Configuration Script for Domain Controllers
            • Run the Windows Configuration Script for the Domain Controllers
            • Add a Domain Controller in Secure Access
            • View the Registered AD Components in Secure Access
        • Connect Active Directory to VAs
          • How to Configure the Setup of the AD Connector
          • (Optional) Specify AD Groups in Selective Sync File
          • Procedure
          • Step 2 – Download the Active Directory Connector
          • Step 3 - Install the Active Directory Connector
          • Change Connector Account Password
          • Configure Updates to AD Connectors
        • Multiple AD Domains with Secure Access Sites
          • Active Directory Sites and Secure Access Sites
          • Use Secure Access Sites
    • Manage End-User Connectivity
      • DNS Servers
      • Traffic Steering for Cisco Secure Client Connections
      • Virtual Private Networks Settings and Profiles
      • Internet Security
    • Manage Users, Groups, and Endpoint Devices
      • View User Details
        • User Details
      • View Group Details
        • Group Details
      • View Organizational Units
      • Provision Token for Identity Provider
        • Procedure
        • Configure Identity Providers
      • Unenroll Devices for Client-Based Zero Trust Access
        • Reenroll the User Device on the Secure Client
        • Procedure
      • Disconnect Remote Access VPN Sessions
      • Import Users and Groups from CSV File
        • Prerequisites
        • Procedure
        • View Provisioned Users and Groups in Secure Access
      • Provision Users and Groups from Okta
        • Prerequisites
        • Limitations
        • Supported Features
        • Import the ObjectGUID Attribute from Okta to Secure Access
        • Configure the Cisco Secure Access App
          • Step 1 – Add the App to Okta
          • Step 2 – Add the Secure Access SCIM Token to the App
          • Step 3 – Configure the Required User Options
          • Step 4 – (Optional) Add a New Attribute and Create the User Profile Mapping
          • Step 5 – Assign Users and Groups in the App
          • Step 6 – View Logs in the App
        • View Provisioned Users and Groups in Secure Access
        • Refresh SCIM Token
      • Provision Users and Groups from Azure
        • Prerequisites
        • Limitations
        • Configure the Cisco User Management for Secure Access App
        • View Provisioned Users and Groups in Secure Access
        • Refresh SCIM Token
    • Configure Integrations with SAML Identity Providers
      • Use Cases
        • Secure Internet Access—Networks and Network Tunnels
        • Zero Trust Access with the Cisco Secure Client
        • Zero Trust Access with an Unmanaged Device
      • Configure Identity Providers for SAML Authentication
      • Prerequisites for SAML Authentication
        • Secure Access Service Provider Metadata
        • Requirements
          • Enable SAML and HTTPS Inspection in the Security Profile
      • Configure Okta for SAML
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Configure the Identity Provider's SAML Metadata
          • Step 3a – Download the Secure Access Service Provider XML File
          • Step 3b – Add Secure Access Service Provider Metadata to Okta
          • Step 3c – Add the Okta SAML Metadata to Secure Access
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • Configure AD FS for SAML
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Add the Identity Provider's SAML Metadata to Secure Access
          • Step 3a – Upload the Identity Provider's SAML Metadata XML File
          • Step 3b – Add the Identity Provider's SAML Metadata
          • Configure Active Directory Federation Services
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • Configure Duo Security for SAML
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Add the Identity Provider's SAML Metadata to Secure Access
          • Step 3a – Upload the Identity Provider's SAML Metadata XML File
          • Step 3b – Add the Identity Provider's SAML Metadata
          • Configure the Duo Security Single Sign-On Application
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • Configure Ping Identity for SAML
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Add the Identity Provider's SAML Metadata to Secure Access
          • Step 3a – Upload the Identity Provider's SAML Metadata XML File
          • Step 3b – Add the Identity Provider's SAML Metadata
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • Configure OpenAM for SAML
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Add the Identity Provider's SAML Metadata to Secure Access
          • Step 3a – Upload the Identity Provider's SAML Metadata XML File
          • Step 3b – Add the Identity Provider's SAML Metadata
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • Configure Microsoft Entra ID for SAML
        • Bypass Domains from SSL Decryption
        • Procedure
        • Step 1 – Choose an Authentication Method
        • Step 2 – Add an Identity Provider
        • Step 3 – Add the Identity Provider's SAML Metadata to Secure Access
          • Step 3a – Download the Secure Access Service Provider XML File
          • Step 3b – Add Secure Access Service Provider Metadata to Microsoft Entra ID
          • Step 3c – Add the Azure SAML Metadata to Secure Access
        • Test the Identity Provider Integration
        • View the SAML Certificates in Secure Access
      • SAML Certificate Renewal Options
        • Known Limitations
        • Automatic Configuration Through the Fixed Metadata URL
        • Manual Import of the Secure Access Signing Certificate
      • Test SAML Identity Provider Integration
        • Procedure
      • Delete SAML Identity Provider Integration
        • Procedure
    • Manage Virtual Private Networks
      • Add an IP Pool
        • Add an IP Pool
        • Add a RADIUS Group (optional)
      • Manage VPN Profiles
      • Add VPN Profiles
        • Step 1 – General Settings
        • Step 2 – Authentication, Authorization, and Accounting
          • SAML
            • SAML Metadata XML Configuration
            • Manual Configuration
          • RADIUS
          • Certificate
        • Step 3 – Traffic Steering (Split Tunnel)
        • Step 4 – Cisco Secure Client Configuration
      • Add a RADIUS Group
      • Manage IP Pools
    • Traffic Steering for Zero Trust Access Client-Based Connections
      • Best Practices
      • Using Wildcards to Configure Traffic Steering for Private Destinations
    • Manage Internet Security
      • Manage Internet Security Bypass
        • Steer Traffic to Secure Access or Bypass Domains
      • Manage Cisco Secure Client Settings
        • Configure DNS and Web Security
        • Configure Advanced Cisco Secure Client Settings
          • User Identities
          • Do Not Forward DNS Traffic to Secure Access
          • Do Not Forward Web Traffic to Secure Access
          • Third Party VPN Compatibility
    • Manage PAC Files
      • What is a PAC file?
      • Deploy the Secure Access PAC File for Windows
        • Procedure
          • Copy the Secure Access PAC File URL
          • Deploy the Secure Access PAC File URL for Chrome and Edge Browsers
          • Deploy the Secure Access PAC File URL for Firefox
      • Deploy the Secure Access PAC File for macOS
        • Procedure
          • Copy the Secure Access PAC File URL
          • Deploy the Secure Access PAC File URL to Chrome
          • Deploy the Secure Access PAC File URL to Firefox
          • Deploy the Secure Access PAC File URL to Safari
      • Customize the Secure Access PAC File
        • Procedure
          • Copy the Secure Access PAC File
          • Download the Secure Access PAC File
          • Edit the PAC File
    • Manage Registered Networks
      • Add Network Resources
        • Prerequisites
        • Procedure
          • Step 1 – Select the Network
          • Step 2 – Configure the Network Resource
          • Step 3 – Change the DNS Settings on Your Relevant Network Device
          • Step 4 – Apply a Policy Rule to the Network Resource
          • Step 5 – Test Your Network
      • Point Your DNS to Cisco Secure Access
        • Cisco Secure Access DNS Resolvers – IP addresses
        • Procedure
          • Step 1 – Identify Where Your Public DNS Server Addresses are Configured
          • Step 2 – Log Into the Server or Router Where DNS is Configured
          • Step 3 – Change Your DNS Server Addresses
          • Step 4 – Test Your New DNS Settings
      • Clear Your DNS Cache
        • Clear Your DNS Cache on Computers and Servers
          • Windows 7 and Earlier
          • Windows 8 and Newer
          • OS X 10.4 TIGER
          • OS X 10.5 and 10.6 LEOPARD
          • OS X 10.7 and 10.8 Lion
          • OS X 10.9 and 10.10
          • Linux
          • Ubuntu Linux
        • Clear Your DNS Cache on Browsers
          • Internet Explorer 8 and Newer – Windows
          • Mozilla Firefox – Windows
          • Apple Safari – macOS
          • Apple Safari – macOS
          • Google Chrome – Windows
          • Google Chrome – macOS
      • Update a Network Resource
      • Delete a Network Resource
    • Manage Internal Networks
      • Add Internal Network Resources
      • Update an Internal Network Resource
      • Delete an Internal Network Resource
    • Manage Destination Lists
      • Add a Destination List
      • Upload Destinations From a File
      • Edit a Destination List
      • Download Destinations to a CSV File
      • Control Access to Custom URLs
        • Block a URL
          • URL Normalization
          • URL Normalization for Destination Lists
          • Troubleshooting Unblocked URLs
          • Reporting for Blocked URLs
        • Examples
        • Troubleshooting
      • Wildcards in Destination Lists
      • Add Punycode Domain Name to Destination List
    • Manage AAA Servers
    • Manage Application Lists
      • Add an Application List
      • Application Categories
      • Delete an Application List
        • Procedure
    • Manage Content Category Lists
      • Available Content Categories
      • Add a Content Category List
      • Request a Category for an Uncategorized Destination
      • Dispute a Content Category
        • Procedure
      • View Content Categories in Reports
        • View Content Categories in Activity Search Report
        • View Content Categories in Top Threats Report
        • View Content Categories in Total Requests Report
        • View Content Categories in Activity Volume Report
        • View Content Categories in Top Destinations Report
        • View Content Categories in Top Categories Report
    • Manage Tenant Control Profiles
      • Add a Tenant Controls Profile
      • Control Cloud Access to Microsoft 365
      • Control Cloud Access to Google G Suite
      • Control Cloud Access to Slack
        • Procedure
      • Control Cloud Access to Dropbox
      • Use Tenant Controls in Access Rules
      • Review Tenant Controls Through Reports
    • Manage Roaming Devices
      • View Internet Security Settings for Roaming Devices
        • Procedure
          • Host Information
          • Security Information – IPv4
      • Edit Internet Security Settings for Roaming Devices
        • Procedure
          • Edit the Auto-Delete Interval for Roaming Devices
          • Disable the Internet Security Settings
          • Enable the Internet Security Settings
          • Remove the Internet Security Override on Roaming Devices
      • Delete a Roaming Device
    • Manage Private Resources
      • Step 1 – Configure Private Resources
        • Optional Configuration for Private Resources
      • Step 2 — Set Up Network Connections, VPN Profiles, and Certificates
      • Step 3 — Add Private Resources in Private Access Rules
      • Step 4 — Set Up the Cisco Secure Client and Distribute URLs
      • Add a Private Resource
      • Add a Private Resource Group
    • Manage Connections to Private Destinations
      • Comparison of Zero Trust Access and VPN
      • Comparison of Client-Based and Browser-Based Zero Trust Access Connections
      • Network Authentication for Zero Trust Access
      • Manage Branch Connections
        • Endpoint Connection Methods
        • Branch Networks in Private Access Rules
          • Users and Groups Connections to Private Resources
          • Sources for Branch Network Connections
          • Destinations for Branch Network Connections
          • Source Connections to Destinations
        • Add an IPS Profile on Private Access Rules
        • Log Connections From Branch Networks to Private Resources
    • Manage the Access Policy
      • About the Access Policy
        • Best Practices
        • Default Rule Data
      • Show Additional Data on Your Access Rules
      • Edit the Order of the Rules in Your Access Policy
      • Rule Defaults: Default Settings for Access Rules
        • Zero Trust Access: Endpoint Posture Profiles
        • Zero Trust Access: User Authentication Interval
        • Intrusion Prevention (IPS)
        • Security Profile
        • Tenant Control Profile
      • Global Settings for Access Rules
        • Global Settings for Access Rules
        • Microsoft 365 Compatibility
          • Limitations
        • Decryption
        • Decryption Logging
        • Certificate Pinning
      • Edit Rule Defaults and Global Settings
      • Edit the Default Access Rules
        • To View or Edit Default Access Rules
    • Get Started With Internet Access Rules
      • Components for Internet Access Rules
        • Sources
        • Destinations
        • Security Controls
          • Intrusion Prevention (IPS)
            • Set Up Certificates for Decrypting Internet Traffic
            • Configure Intrusion Prevention (IPS) Profiles
            • Configure the Do Not Decrypt List for IPS
          • Web Security
            • Configure Threat Category Settings
            • Configure SAML Authentication
            • Set Up Certificates for Decrypting Internet Traffic
            • Configure Do Not Decrypt Lists for Web Security
            • (Optional) Configure Custom End-User Block and Warn Notifications
            • Configure Security Profiles
          • Tenant Controls
      • Default Settings for Internet Access Rules
      • Add an Internet Access Rule
        • Prerequisites
        • Procedure
        • Access Options
          • Disable or Enable the rule
          • Logging settings
          • Summary
          • Rule name
          • Rule order
          • Rule action
          • Sources
          • Destinations
          • Advanced Application Controls
        • Security Control Options
          • Intrusion Prevention (IPS)
          • Security Profile
          • Tenant Control Profile
          • Advanced Security Controls
          • Next Steps
      • About Configuring Destinations in Internet Access Rules
        • Destination Components for Internet Access Rules
        • Destinations Created Directly in an Internet Access Rule
          • IP Addresses and CIDR Blocks
          • Ports
          • Protocols
        • Combining Multiple Destinations in a Rule (Boolean Logic)
        • Number of Destinations in a Rule
      • Advanced Application Controls
        • Applications with Advanced Controls
          • Cloud Storage
          • Collaboration
          • Content Management
          • Media
          • Office Productivity
          • P2P
          • Social Networking
        • Procedure
        • Troubleshooting
      • About Configuring Sources in Internet Access Rules
        • Source Components for Internet Access Rules
        • Sources Added Directly in an Internet Access Rule
        • Combining Multiple Sources in a Rule (Boolean logic)
      • Global Settings for Internet Access Rules
      • About Isolated Destinations
        • Prerequisites
        • Secure Access Package Support for RBI and Isolation Rules
        • Limitations of Isolation
      • Troubleshoot Internet Access Rules
        • Problems while creating the rule
        • Problems after creating a rule
          • Internet traffic is unexpectedly blocked
          • Internet traffic is unexpectedly allowed
          • Internet Access rule is not matching traffic as expected
    • Get Started With Private Access Rules
      • Components for Private Access Rules
        • Sources
        • Destinations
          • Private Resources
          • Private Resource Groups
        • Endpoint Posture Profiles (for Endpoint Requirements)
        • Security Controls
      • Default Settings for Private Access Rules
      • Add a Private Access Rule
        • Prerequisites
        • Set Up the Private Access Rule
          • Enable the Rule and Edit Your Logging Settings
          • Add a Rule Name
          • Choose a Rule Order
        • Step 1 — Specify Access Options
          • Rule Action
          • Sources
          • Destinations
          • Endpoint Requirements
          • User Authentication Requirements
        • Step 2 — Configure Security Control Options
        • Summary
      • About Configuring Sources in Private Access Rules
        • Source components
        • Sources created directly in a private access rule
        • If there are multiple sources in a rule (Boolean logic)
      • About Configuring Destinations in Private Access Rules
        • Destination components for private access rules
        • Destinations created directly in a private access rule
        • If there are multiple destinations in a rule (Boolean logic)
      • About Endpoint Requirements in Access Rules
      • Allowing Traffic from Users and Devices on the Network
      • Global Settings for Private Access Rules
      • Troubleshoot Private Access Rules
        • General Troubleshooting Tips
        • Problems While Creating a Rule
        • Problems After Creating a Rule
          • Traffic is unexpectedly blocked
          • Traffic is unexpectedly allowed
          • Rule does not match traffic as expected
    • Manage Endpoint Security
      • About Endpoint Posture
      • About Posture Profiles
      • Endpoint Posture Assessment
      • Endpoint Attributes
    • Manage Zero Trust Access Posture Profiles
      • Zero Trust Access Posture Attributes
      • Add a Client-Based Zero Trust Access Posture Profile
      • Add a Browser-Based Zero Trust Access Posture Profile
    • Manage VPN Connection Posture Profiles
      • VPN Posture Attributes
      • Add a VPN Connection Posture Profile
    • Manage IPS Profiles
      • How IPS Works
      • Decryption is Required for Effective Intrusion Prevention
      • Exceptions for Traffic That Should Not be Decrypted
      • IPS is Used in Both Types of Access Rules
      • Add a Custom IPS Signature List
        • Procedure
        • Reset a Signature's Action
    • Manage Security Profiles
      • Security Profiles for Internet Access
        • Functionality Included in a Security Profile for Internet Access
        • Decryption
        • SSO Authentication
        • Security and Acceptable Use Controls
        • End-User Notifications
        • Get Started: Security Profiles for Internet Access
      • Add a Security Profile for Internet Access
        • Add a Security Profile
        • Enable or Disable Decryption
        • SSO Authentication
        • Security and Acceptable Use Controls
          • Threat Categories
          • File Inspection
          • File Type Blocking
          • SafeSearch
        • Configure End-User Notifications
        • View Security Profiles
        • Configure Additional Security Options
        • Add a Security Profile on Internet Access Rules
        • Edit a Security Profile
        • Delete a Security Profile
      • Enable SafeSearch
        • Confirm That SafeSearch is Working
          • Google
          • YouTube
          • Yahoo
          • Bing
      • Security Profiles for Private Access
      • Add a Security Profile for Private Access
    • Manage Threat Categories
      • Threat Category Descriptions
      • Add a Threat Category List
      • Dispute a Threat Categorization
    • Manage File Inspection and File Analysis
      • Overview of Configuring File Inspection and Analysis
      • File Inspection Details
      • Enable File Inspection
      • Enable File Analysis by Cisco Secure Malware Analytics
      • Test File Inspection
        • Procedure
          • Block Page Diagnostic Information
      • Monitor File Inspection and Analysis Activity
      • Troubleshoot and Monitor File Inspection and Analysis
    • Manage File Type Controls
      • Enable File Type Controls
        • About File Type Controls for Internet Access
        • About File Type Controls for Private Access
        • Procedure
        • Enable File Type Blocking for Internet Access
        • Enable File Type Blocking for Private Access
      • File Types to Block
      • Review File Type Controls Through Reports
    • Manage Notification Pages
      • Preview Notification Pages
      • Create Custom Block and Warn Pages
        • Link a Custom Notification Page Appearance to a Security Profile
      • Allow Users to Contact an Administrator
    • Manage Traffic Decryption
      • Internet Access Features Requiring Decryption
      • Internet Traffic That Should Not Be Decrypted
      • Decryption in Private Access Rules
      • Decryption Settings
      • Decryption Requires Certificates
      • Decryption Logging
      • Troubleshooting Decryption
      • Important Information About Do Not Decrypt Lists
        • Do Not Decrypt List for IPS
        • Do Not Decrypt Lists for Web
        • Differences Between IPS and Web Destination Types
        • The System-Provided Do Not Decrypt List
        • Limitation: Do Not Decrypt Based on Content Category
      • Add a Do Not Decrypt List for Security Profiles
    • Manage Certificates
      • Certificates for Internet Decryption
        • Option 1: Distribute Self-Signed Certificates to End-User Devices
        • Option 2: Use a Signed Certificate for Decrypting Internet Traffic
      • Install the Cisco Secure Access Root Certificate
        • Download the Cisco Secure Access Root Certificate
        • Automatically Install the Cisco Secure Access Root Certificate (For an Active Directory Network)
          • Install the Cisco Secure Access Root Certificate with Group Policy Using the Microsoft Management Console (MMC)
          • Install the Cisco Secure Access Root Certificate with Group Policy Using the Group Policy Management Console (GPMC)
        • Install the Cisco Secure Access Root Certificate in Firefox Using Group Policy
        • Install the Cisco Secure Access Root Certificate on Chromebooks Using the Google Admin Console
        • Manually Install the Cisco Secure Access Root Certificate (Single Computer)
          • Install the Cisco Secure Access Root Certificate in Edge or Chrome on Windows
          • Install the Cisco Secure Access Root Certificate in Firefox on Windows
          • Install the Cisco Secure Access Root Certificate in All Browsers on Mac OS X
          • Install the Cisco Secure Access Root Certificate on Mac OS X Through the Command Line
          • Install the Cisco Secure Access Root Certificate in Chromium or Chrome on Linux
      • Add Customer CA Signed Root Certificate
        • Certificate Requirements
        • Install Root Certificate in Browsers
        • Procedure
      • Manage Certificates for Private Resource Decryption
        • Install a Certificate Authority Certificate on a Private Resource
        • View Notifications About Expired Private Resource Certificates
        • Upload Private Resource Certificates
        • Option 2: Upload a certificate and key to the Certificates page
      • View the Cisco Trusted Root Store
        • Download the Cisco Trusted Union Root Bundle
        • Extract the Certificates
          • Step 1: Extract the Signing Certificate
          • Step 2: Extract Certificate Bundle as Message
          • Step 3: Extract PEM-Formatted Certificates From Bundle
          • Step 4: Generate Individual Certificate Files
        • View an Individual Certificate File
      • Manage SAML Certificates for Identity Providers
        • Procedure
          • View Notifications About Expired Identity Provider Certificates
          • Manage Web Security and Zero Trust Identity Provider Certificates
          • Manage Virtual Private Network Identity Provider Certificates
      • Certificates for Private Resource Decryption
      • Certificates for SAML Authentication
      • Manage SAML Certificates for Service Providers
        • Procedure
          • View Notifications About Expired Service Provider Certificates
          • Download Web Security and Zero Trust Service Provider Certificates
          • Download Virtual Private Network Service Provider Certificates
      • VPN Certificates for User and Device Authentication
      • Manage CA Certificates for VPN Connections
        • Install an Identity Certificate on User Devices
        • View Notifications About Expired CA Certificates for Client Authentication
        • Upload Certificate Authority (CA) Certificates for client authentication
        • View Uploaded CA Certificates
        • Manage Certificate Revocation Settings
        • View CA Certificate Details
        • Delete a Client Authentication CA Certificate
        • Expired Certificates
    • Manage the Data Loss Prevention Policy
      • Add a Real Time Rule to the Data Loss Prevention Policy
      • Understand Exclusions in a Real Time Rule
      • Supported Applications
      • Add a SaaS API Rule to the Data Loss Prevention Policy
      • Discovery Scan
        • Prerequisites
        • Initiate a Discovery Scan
        • Cancel a Discovery Scan
      • Edit a Data Loss Prevention Rule
        • Procedure
      • Delete a Data Loss Prevention Rule
        • Procedure
      • Enable or Disable a Data Loss Prevention Rule
        • Disable a Rule
        • Enable a Rule
      • Supported File and Form Types
      • Best Practices for the Data Loss Protection Policy
    • Manage Data Classifications
      • Create a Data Classification
        • Procedure
      • Copy and Customize a Data Identifier
        • Procedure
      • Delete or Edit a Classification
        • Delete a Classification
        • Edit a Classification
      • Create an Exact Data Match Identifier
        • Procedure
      • Index Data for an EDM
        • Run the DLP Indexer to Create an EDM Identifier
        • Update the Indexed Data Set Periodically
        • Troubleshooting
      • Create an Indexed Document Match Identifier
        • Limitations
        • Create an Indexed Document Match Identifier
        • Monitor the Indexed Data Set and Re-Index as Needed
        • Troubleshooting
      • Built-In Data Classifications
      • Exact Data Match Field Types
        • Supported EDM Types
    • Built-in Data Identifiers
      • Tolerances
      • Copy and Customize a Built-In Data Classification
        • Procedure
      • Create a Custom Identifier
        • Procedure
      • Custom Regular Expression Patterns
        • Limitations
          • General
          • Regex Syntax
          • Regex Breadth
          • Word Boundary
      • Individual Data Identifiers
        • Drug Name
        • Health Condition
        • ICD-10 Code
        • US Person Name
    • Manage SaaS API Data Loss Prevention
      • Enable SaaS API Data Loss Protection for Box Tenants
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Dropbox Tenants
        • Limitation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Google Drive Tenants
        • Validation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Microsoft 365 Tenants
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Webex Teams
        • Authorize a Tenant
        • Revoke Authorization
    • Manage Cloud Malware Protection
      • Enable Cloud Malware Protection
      • Revoke Authorization for a Platform
      • Enable Cloud Malware Protection for Box Tenants
        • Verify Box Application Settings
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Dropbox Tenants
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Google Drive
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Microsoft 365 Tenants
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Webex Teams
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
    • Manage Logging
      • Enable Logging
      • Enable Logging to Your Own S3 Bucket
        • Prerequisites
          • JSON Bucket Policy
        • Procedure
        • S3 Bucket Data Path
        • Download Files From the S3 Bucket Locally
      • Stop Logging
      • Log Formats and Versioning
        • Log File Name Formats
          • Subfolders
          • Find Your Log Schema Version
            • Log Schema Versions
            • View Your Log Schema Version and Last Sync Time
          • Log File Fields
          • Estimate the Size of a Log
          • Estimate the Size of an Exported Report
        • Reports and CSV Formats
          • Activity Search Report
            • Zero Trust Access Activity Search Fields
          • Top Categories Report
          • Top Destinations Report
          • Top Resources Report
        • Admin Audit Log Formats
        • Cloud Firewall Log Formats
        • Data Loss Prevention (DLP) Log Formats
        • DNS Log Formats
        • IPS Log Formats
        • Remote Access VPN Log Formats
        • Web Log Formats
        • Zero Trust Access Log Formats
    • Manage API Keys
      • Add Secure Access API Keys
        • Add API Key
        • Refresh API Key
        • Update API Key
        • Delete API Key
      • Add KeyAdmin API Keys
        • Use Cases
        • Add KeyAdmin API Key
        • Refresh KeyAdmin API Key
        • Update KeyAdmin API Key
        • Delete KeyAdmin API Key
    • Manage Accounts
      • Add a New Account
        • Procedure
      • Edit Account Settings
        • Procedure
      • Delete an Account
        • Procedure
      • Hide Sources with De-identification
        • Source Types
        • Enable De-identification
        • Disable De-identification
        • Limitations
    • Manage Domains
      • Add Internal Domains
        • Procedure
    • Manage Resources
      • Resource menu items that can be used as sources in access rules:
      • Resource menu items that can be used as destinations in internet access rules:
      • Resource menu items that can be used as destinations in private access rules:
      • Additional resources
    • Manage DNS Servers
      • Procedure
  • Cisco Secure Client
    • Get Started with Cisco Secure Client
      • Download Cisco Secure Client
        • Procedure
      • Install the Root Certificate for All Browsers
        • Inspect and Decrypt HTTPS Traffic
        • Render Block and Warn Pages
      • Install the Cisco Secure Client
        • Procedure
    • Manage Client-based Zero Trust Access from Mobile Devices
      • Set up the Zero Trust Access App for iOS Devices
        • System Requirements
        • Guidelines and Limitations
        • Configure Settings in Cisco Secure Access
        • Install the App
        • Have End Users Enroll in Zero Trust Access
        • Notes for administrators
      • Set up the Zero Trust Access App for Android on Samsung Devices
        • Configure Cisco Secure Access
        • Install the App
        • (Optional) Set up the Android device for Zero Trust Access using MDM
          • Add the app to MDM
          • Set up the App on the Samsung Device
        • Enroll the Device in Zero Trust Access
        • Notes for administrators
      • Monitor and Troubleshoot Zero Trust Access from Mobile Devices
        • Monitor Activity
        • General Troubleshooting
        • Troubleshoot iOS Devices
        • Troubleshoot Samsung Devices Running Android OS
    • Manage Zero Trust Access on Cisco Secure Client
      • Requirements for Secure Client with Zero Trust Access
      • Invite Users to Enroll in Zero Trust Access for Secure Client
        • Recommended: Use MFA Authentication and Biometric Identity
        • Procedure
      • Troubleshoot Client-Based Zero Trust Access
        • Pre-Enrollment Errors
        • Enrollment Errors
        • Post-Enrollment Errors
        • Requests to Reauthenticate
      • Unenroll a Device from Zero Trust Access
    • Manage Virtual Private Networks on Cisco Secure Client
      • Download the Virtual Private Network XML Profile
      • CA Certificates for VPN Connections
    • Manage Internet Security on Cisco Secure Client
      • Umbrella Roaming Security Module Requirements
        • System Requirements
        • Network Requirements
        • Roaming Security DNS Requirements
        • Internal Domains
      • Domain Management
        • Internal Domains List
        • DNS Suffixes
        • Operational Flow
        • Advanced Topics
      • DNS Protection Status
        • DNS and IP Layer State Descriptions
      • Interpret Internet Security Diagnostics
        • Procedure
          • Generate the Diagnostic Report from the Cisco Secure Client
          • Generate the Diagnostic Report on the Command Line
      • Download the OrgInfo.json File
      • Customize Windows Installation of Cisco Secure Client
        • Requirements
        • Procedure
          • Deploy the Cisco Secure Client VPN Module
          • Deploy the Cisco Secure Client Umbrella Roaming Security Module
          • (Optional) Deploy the Cisco Secure Client DART Module
          • Hide Cisco Secure Client from Add/Remove Programs List
        • Optional OrgInfo.json Configurations
      • Customize macOS Installation of Cisco Secure Client
        • Requirements
        • Procedure
        • Step 1 – Make the DMG Package Writeable
        • Step 2 – Generate the Module Installation Configuration File
        • Step 3 – Copy OrgInfo.json to Cisco Secure Client Installation Directory
        • Step 4 – (Optional) Hide the VPN Module
        • Step 5 – Customize the Cisco Secure Client Installation Modules
          • Example – Customize Cisco Secure Client Modules
        • Step 6 – Set Up the Correct Extension Permission Settings
        • Step 7 – Install Cisco Secure Client with Selected Modules
  • DNS Forwarders
    • Get Started with Virtual Appliances
      • How Secure Access Virtual Appliances Work
      • Virtual Appliances and Granular Identity Information
      • Active Directory Integration
      • Configure Granular Rules
      • Prerequisites for Virtual Appliances
        • Endpoint Software
        • Virtual Appliance Requirements
        • Networking Requirements
          • Allow Connections to Various Domains and Services
          • Network Time Protocol Servers
          • Intrusion Protection Systems (IPS) and Deep Packet Inspection (DPI)
          • Network Address Translation (NAT)
        • Encrypting Traffic with DNSCrypt
      • Virtual Appliance Deployment Guidelines
        • Deploy Virtual Appliances in Pairs
        • Multiple DNS Egresses
        • Single DNS Egress
        • Double NAT
      • Virtual Appliance Sizing Guide
        • High-Traffic Sites and Virtual Appliances
        • AD Connector Sizing Guidelines
        • Deployment Considerations
          • Overall Latency
          • Number of Secure Access Sites
          • Number of Users for a VA
    • Manage VAs in Secure Access
      • Configure Authentication for Virtual Appliances
        • How to Set Up Your API Credentials
        • Procedure
          • Step 1 – Create the Key Admin API Key Credentials
          • Step 2 – Add the Key Admin API Key Credentials
        • Refresh Client API Key and Secret
        • Reset Client API Key
      • Manage DNS Forwarders
        • Procedure
          • View the DNS Forwarders
          • Sync the Configuration Settings to Deployed VAs
          • Edit a Site
          • Upgrade a Virtual Appliance
          • Reset Password
          • Delete a Virtual Appliance
      • Manage Site for Virtual Appliance
        • Procedure
          • Add a Site
          • Select a Site
          • Rename a Site
          • Delete a Site
      • Configure Updates for Virtual Appliances
        • How Secure Access Updates Your Virtual Appliance
        • Procedure
          • Configure Automatic Updates of Virtual Appliances
          • Manually Configure Update of a Virtual Appliance
          • Postpone Updates to Virtual Appliances
    • Deploy Virtual Appliances
      • Guidelines
      • Deploy the Secure Access Virtual Appliances
      • Deploy VAs in Hyper-V for Windows 2012 or Higher
        • Configure Authentication for the Virtual Appliances
        • Procedure
          • Step 1 – Download and Extract the Hyper-V Installer
          • Step 2 – Import the Virtual Appliance
          • Step 3 – Copy and Rename Image Files
          • Step 4 – Select Network Adapter
          • Step 5 – Select Hard Drive
          • Step 6 – Power on the Virtual Machine
          • Step 7 – Repeat for the Second Virtual Appliance
      • Deploy VAs in VMware
        • Configure Authentication for the Virtual Appliances
        • Procedure
          • Step 1 – Download OVF Template
          • Step 2 – Deploy OVF Template
          • Step 3 – Deploy a Second Virtual Appliance
          • Step 4 – Power on the Virtual Machines
    • Configure Virtual Appliances
      • Enter Configuration Mode on a VA Deployed on VMware and Hyper-V
      • Configure the VA Through Configuration Mode
      • Configure a Second VA
      • Configure Settings on VAs
        • Configure Rate Limiting
          • Enable Rate Limits on a VA
          • Disable Rate Limiting
          • Check Status and Packet Drops
        • Configure NTP Servers
          • Add NTP Servers to the VA
          • Remove NTP Servers
          • View the VA's Current NTP Servers
        • Configure Secure Access Resolvers
          • Use the IPv4 Secure Access DNS Resolvers
          • Use the Alternate Secure Access DNS Resolvers
          • Use the US-Only IPv4 Secure Access DNS Resolvers
          • Use the Saudi Arabia-Only IPv4 Secure Access DNS Resolvers
        • Configure DNSSEC Support
          • Configure VA to Preserve the DO Bit
          • Turn Off the DO Bit
        • Configure Logging to Remote Syslog Server
          • Configure the Destination of the Remote Syslog Server
          • Configure Log Export Internal DNS
          • Configure Log Export Enable Health
          • Configure Log Export Enable Admin
          • Configure Log Export Enable All
          • Configure Log Export Status
          • Turn Off Logging
        • Configure Dual-NIC Support on the VA
          • Configure an Existing VA to Support Dual-NIC
          • Deploy a New VA to Support Dual-NIC DMZ Mode
        • Configure Anycast
          • Configure Anycast over BGP on the VA
          • Configure Load Balancing
            • Add a Load Balancer
            • Remove a Load Balancer
          • Configure Identity Association Timeouts
          • Configure API Key Credentials for Authentication
            • Configure the Client ID and Client Secret
    • Local DNS Forwarding
      • Manage Domains in the VA
        • Which domains should be added?
        • (Optional) Add A & PTR Records for the VAs
      • Configure Local DNS Servers on the VA
        • Examples
    • Test Virtual Appliance Deployments
      • Resolve Public and Local DNS Queries
        • nslookup opendns.com <VA IP Address>
          • nslookup dc01.localdomain.corp. <VA IP Address>
          • Test with Endpoints
          • Transition Production Traffic
    • SNMP Monitoring for Virtual Appliances
      • Enable SNMP Monitoring
        • SNMPv2.x
        • SNMPv3
        • Privacy Password
        • Configure SNMP in Secure Access Virtual Appliance
        • SNMP Command Syntax
      • About SNMP Monitoring
      • Standard OIDs Supported by the Virtual Appliance
      • Extended OIDs Supported by the Virtual Appliance
    • Troubleshoot Virtual Appliances
      • Reset a Virtual Appliance's Password
      • Use Configuration Mode to Troubleshoot
      • Troubleshoot Intermittent DNS Resolution Failures on a VA Deployed on Azure
      • Troubleshoot DNS Resolution in Configuration Mode
      • Troubleshoot DNS Resolution Failures Behind a Firewall
    • PIV-CAC Support
  • Reports
    • Monitor Secure Access with Reports
      • Export Report Data to CSV
      • Bookmark and Share Reports
        • Procedure
      • Report Scheduling
      • Schedule a Report
        • Procedure
          • Check Your Spam Folder
          • Unsubscribe From a Report
      • Update a Scheduled Report
        • Procedure
      • Report Retention
        • Admin Audit Log Retention
    • Remote Access Log Report
      • Connection Events – Failed
    • Activity Search Report
      • View Activity Search Report Actions
        • See Full Details
        • Filter Views
      • Schedule an Activity Search Report
      • Use Search and Advanced Search
        • Search
        • Wildcards
          • Domains
          • URLs
          • File Names
        • Advanced Search
      • View the Activity Search Report
        • View the Activity Search Report
          • Configure Columns to Display
        • View Actions
          • View Full Details
          • Filter Views
        • Schedule an Activity Search Report
    • Security Activity Report
      • View Activity and Details by Filters
        • Procedure
      • View Activity and Details by Event Type or Security Category
        • Procedure
          • Group Security Categories
      • View an Event's Details
        • Procedure
      • Search for Security Activity
        • Procedure
          • Advanced Search
    • Total Requests Report
      • View Trends in the Total Requests Report
    • Activity Volume Report
      • View Requests by Volume of Activity
      • View Activity Volume by Threat Categories
        • Prevent
        • Contain
      • View Activity Volume by Policy Traffic
      • View Trends
    • App Discovery Report
      • View the App Discovery Report
        • View the App Discovery Report
      • View the Highest Risk Apps
        • Procedure
      • Review Apps in the Apps Grid
        • Procedure
        • Configure Columns to Display
        • Change the Label of an App
      • View App Details
        • Procedure
      • Change App Details
        • Change the Risk Score for an App
        • Change the Label of an App
      • Control Apps
        • Procedure
        • Control Application Lists
      • Control Advanced Apps
        • Procedure
      • View Traffic Data Through SWG Service
        • View Traffic
        • View Traffic in the Apps Grid
        • View Traffic in the App Details
    • Top Destinations Report
      • View the Top Destinations Report
      • View Further Details
      • Destination Details
        • View the Destination Details
        • View the Request Traffic
          • View Requests by Blocked or Allowed
          • View Requests Through Global Traffic %
        • View the Access and Policy Details
        • View Recent Activity
        • View the Most Visited URL Paths
    • Top Categories Report
      • View the Top Categories Report
        • Report Fields
        • Sort by Traffic
        • Ascending or Descending Order
      • Top Categories Quick View
      • View Category in Other Reports
      • Category Details
        • View a Category's Details Overview
        • View a Category's Traffic
          • View the Activity Breakdown
          • View the Traffic Bandwidth
        • View a Category's Identities
        • View the Category's Top Domains
    • Cloud Malware Report
      • View the Cloud Malware Report
      • Use the Cloud Malware Report
        • Quarantine a Malicious File
        • Restore a Quarantined File
        • Delete a Malicious File
        • Dismiss an Item from the Report
        • Export a Cloud Malware Report
    • Data Loss Prevention Report
      • View Events
        • View Details
        • Delete File
        • Quarantine File
        • Restore File from Quarantine
        • Use Advanced Search
      • View a Discovery Scan
    • Admin Audit Log Report
      • Generate Admin Audit Log Report
      • Export Admin Audit Log Report to an S3 Bucket
        • Procedure

Cisco Secure Access for Government Help Manage Cloud Malware Protection Enable Cloud Malware Protection for Microsoft 365 Tenants Authorize a Tenant

Last updated: Dec 09, 2025

Previous topic Enable Cloud Malware Protection for Microsoft 365 Tenants Next topic Edit a Tenant
© 2025 Cisco System, Inc.
Privacy policyTerms of Service