Cisco Secure Access Help Cisco Secure Access Help Welcome to Cisco Secure Access Sign into Secure Access with Security Cloud Sign On Prerequisites Procedure Find Your Organization ID Prerequisites Procedure Determine Your Current Package Prerequisites Procedure View Cloud Security Service Status Secure Access Services Overview Regional Service Status Scheduled Maintenance Service Status History No Incidents Reported Past Incidents Contact Cisco Secure Access Support Secure Access Single Sign-On Authentication Configure Single Sign-On Authentication Prerequisites Add Your Organization's Identity Provider in Security Cloud Sign On Add Administrators to Secure Access Procedure Troubleshoot Single Sign On Authentication Get Started Begin Secure Access Onboarding Workflow Step 1 – Configure Network Connections Prerequisites Task 1 – Add Network Connections Add Network Tunnel Groups Add Resource Connectors and Connector Groups Task 2 – Provision Users and Groups Task 3 – Configure Integrations with SAML Identity Providers What's Next Step 2 – Configure Access to Resources Prerequisites Task 1 – Set Up Private Resources Task 2 – Configure Rule Defaults and Global Settings Manage Rule Defaults Manage Global Settings Task 3 – Add a Policy Rule What's Next Step 3 - Configure End User Connectivity Prerequisites Task 1 – Configure Zero Trust Task 2 – Configure Virtual Private Networks Task 3 – Configure Internet Security Configure Endpoints and Networks Step 4 – Configure Endpoints and Network Sources Prerequisites Add Networks to Secure Access Set Up the Cisco Secure Client Add IPS Profiles Configure Rule Profiles Secure Access Overview Dashboard Prerequisites Get Started Workflow Experience Insights Connectivity Data Transfer Security Security Activity Top Security Categories Users and Groups Private Resources Quickstarts Prerequisites Quickstart – Cisco Secure Client with Zero Trust Access Prerequisites Procedure Test Your Connectivity Quickstart – Cisco Secure Client with Virtual Private Network Prerequisites Procedure Test Your Connectivity Quickstart – Cisco Secure Client with Internet Security Prerequisites Procedure Test Your Connectivity Quickstart – Browser with SAML Authentication Prerequisites Procedure Test Your Connectivity Quickstart – Bring Your Own Device with Zero Trust Prerequisites Procedure Test Your Connectivity Limitations and Range Limits Access Policy Cisco Secure Client Data Retention Destinations for Client-Based Zero Trust Traffic Domain Names File Inspection and File Analysis Internet Protocol Versions Other Components Reports Resource Connectors and Resource Connector Groups Service Connections Users and Groups Cloud Identity Providers Users and Private Applications Network Requirements for Secure Access Secure Access DNS Resolvers Best Practices Cisco Secure Client Cisco Secure Client and External DNS Resolution Secure Access Encrypted DNS Queries Secure Access DNS, Web, and Block Pages Secure Access DNS and Web – Client Configuration Services Windows Only Secure Access DNS and Web – Client Sync Services Secure Access DNS and Web – Client Certificate Revocation Services Cisco Secure Client and Captive Portal Detection Cisco Secure Client and Device Hostnames Transport Layer Security Protocol Requirements TLS 1.2 Support in Windows TLS 1.2 Support in macOS Secure Access Secure Web Gateway Services Egress IP Addresses for the Secure Web Gateway Ingress IP Addresses for the Secure Web Gateway Secure Access Encrypted Web Requests Secure Access Realtime DLP Secure ICAP Secure Access SaaS Tenants Microsoft 365 Secure Access SAML Gateway Services Active Directory Federation Service SAML Identity Provider Secure Access SAML Identity Provider Domains Azure AD SAML Identity Provider Secure Access SAML Gateway Client Certificate Revocation Services Secure Access VPN Services Secure Access VPN Client Certificate Revocation Services Secure Access Zero Trust Client-Based Enrollment Services Secure Access Zero Trust Client-Based Proxy Services Known Network Restrictions for Zero Trust Clients Secure Access Zero Trust Client-Based Proxy – Client Certificate Revocation Services Secure Access Zero Trust Proxy Services – Unmanaged Devices Secure Access Zero Trust Services and Connector Groups Secure Access NAT as a Service Web Traffic and NATaaS IPv4 Shared Ranges IPv6 Shared Ranges Non-Web Traffic and NATaaS Best Practices Reserved IP Network Requirements Best Practices Deployment of the Reserved IP Known Limitations IPv6 Remote Browser Isolation Reserved IP Surrender Port Exhaustion Reporting and Reserved IP Calculate Your Maximum Sessions Example Troubleshooting Reserved IP Supplemental Terms Cisco Secure Access Reserved IP Supplemental Terms Effective January 31, 2024 1. Scope of Use of Reserved IP 2. Third Party Notifications 3. Ownership; Right to Reclaim 4. Right to Modify or Discontinue 5. Compliance with Policies and Assistance Manage Network Connections IPsec Network Tunnels Resource Connector Groups Comparison of Network Connection Methods If a Private Resource is Served by Both a Tunnel Group and a Connector Group Comparison of Network Connection Methods Resource Connectors (Deployed in Connector Groups) Network Tunnels (Deployed in Network Tunnel Groups) Manage Network Tunnel Groups Failover for Branch Connections in Secure Access Data Centers Primary Traffic Failover to Secondary Recommendations Device Compatibility and Network Tunnels IPsec Tunnel Requirements Supported Devices for Setting Up IPsec Tunnels Add a Network Tunnel Group About Network Tunnel Groups Procedure Step 1 - General Settings Step 2 - Tunnel ID and Passphrase Step 3 - Routing Step 4 - Data for Tunnel Setup What to do Next Delete a Network Tunnel Group Procedure Edit a Network Tunnel Group Procedure View Network Tunnel Group Details Procedure Supported IPsec Parameters Network Tunnel Configuration Establish a Tunnel Maximum Transmission Unit (MTU) Size Tunnel Size Carrier-Grade NAT (CGNAT) Requirement Client Reachable Prefixes Throughput and Multiple Tunnels Routing Options and Guidelines Static Routing Dynamic Routing with BGP BGP Guidelines and Best Practices for Secure Access Secure Access BGP Configuration Key Considerations for Dynamic Routing Tunnel Redundancy and High Availability View BGP Routes Important Restrictions Configure Tunnels with Cisco Catalyst SD-WAN Prerequisites Step 1: Add a Network Tunnel Group in Secure Access Step 2: Configure Cisco Catalyst SD-WAN Templates Define the Feature Template Add the IPsec Interface Template Configure Static Routes Verify Tunnel Status Configure Tunnels with Cisco ISR Prerequisites Licensing and Hardware Network Access Configure Tunnels in Secure Access Configure ISR (G2, 4K) or CSR Test Your Configuration Check Tunnel Status Manually Trigger the Tunnel Verify Tunnel Status Configure Tunnels with Cisco Adaptive Security Appliance Prerequisites Licensing and Hardware Network Access Configure Tunnels in Secure Access Configure ASA Test and Verify Configure Tunnels with Cisco Secure Firewall Configure Secure Firewall Policy-based VPN Configure Tunnels in Secure Access Add Network Object Add Traffic Selector ACL Configure Site-to-Site VPN Configure NAT Policy Configure Access Policy Configure Secure Firewall VTI, PBR, and Per Tunnel Identity Configure Tunnels in Secure Access Configure Site-to-Site VPN Configure Policy-based Routing Configure Access Policy Troubleshooting Enable Logging for Debugging Configure Tunnels with Meraki MX Prerequisites Caveats and Considerations Supported Use Cases and Requirements Remote Access VPN and ZTA Branch-to-Branch through Secure Access Secure Internet Access with Non-Meraki VPN Step 1: Add a Network Tunnel Group in Secure Access Step 2: Configure a Tunnel in Meraki MX Verification and Troubleshooting Optional Configurations Configure Tunnels with NEC IX2000 Series Router Prerequisites Configure Tunnels in Secure Access Configure the NEC IX router Test the NEC IX router Deployment Other Resources Supported IPsec Parameters NEC IX router Configure a Site-to-Site VPN tunnel with Microsoft Azure Overview Prerequisites Configure S2S Tunnels with Static Routing Step 1: Create a VPN Gateway in Microsoft Azure Step 2: Create a network tunnel group in Secure Access Step 3: Create two local network gateways in Azure with S2S connections Step 4: Create a static route table in Azure Step 5: Verify tunnel status in Secure Access Configure S2S Tunnels with Dynamic Routing with BGP Step 1: Create a VPN Gateway in Microsoft Azure Step 2: Create a network tunnel group in Secure Access Step 3: Create two local network gateways in Azure with S2S connections Step 4: Verify tunnel status in Azure and Secure Access What to do next Manage Resource Connectors and Connector Groups Overview: Setting Up Resource Connectors and Connector Groups Requirements and Prerequisites for Resource Connectors and Connector Groups Guidelines for Connector Groups Connector Group Region Redundancy Across Connector Groups Requirements and Guidelines for Connectors Connectivity Requirements Capacity Requirements Allow Resource Connector Traffic to Secure Access Region-Specific Destinations Destinations For All Regions Add Resource Connector Groups Prerequisites Guidelines for Configuring Domains and DNS Servers on Connectors Groups About Resource Connectors and DNS resolution of Internal Domains Procedure Configure Connector Group Name and Region Estimate the Volume of Traffic to Your Resource Connectors (Optional) Add Domains and DNS Servers for the Connector Group What's Next Add Connectors to a Connector Group Prerequisites Procedure Step 1 – Deploy Secure Access Resource Connectors Step 2 – Confirm Connectors Step 3 – Assign Private Resources to Connector Group Obtain the Connector Image Requirements Get the Connector Image for AWS Get the Connector Image for Microsoft Azure Download the Connector Image for VMware Get the Connector Image for Docker Provisioning Keys for Resource Connectors Important Information about Provisioning Keys Prerequisites Procedure Copy the Provisioning Key for a Connector Group Deploy a Connector in VMware Prerequisites Add a Connector Group Obtain the Connector Image Disk Encryption SSH Key Generation UEFI Secure Boot Environment for Resource Connector Images Requirements for the UEFI Secure Boot Environment Procedure Step 1 – Extract the Connector Image for VMware Tar File Step 2 – Verify the Integrity of the Image Validate the Signature Verify the Checksum of the Signing Key Step 3 – Deploy the OVF Template Step 4 – Power on Connector Instances Step 5 – Confirm Connectors Deploy a Connector in AWS Prerequisites Get Connector Images on the AWS Marketplace UEFI Secure Boot Environment for Resource Connector Images Requirements for the UEFI Secure Boot Environment Procedure Step 1 – Launch an Amazon Machine Image for the Connector Instance Step 2 – Configure the Connector Step 3 – Launch the Connector Instance Deploy a Connector in Azure Prerequisites UEFI Secure Boot Environment for Resource Connector Images Deployment Requirements Procedure Step 1 – Get Connector Images on Microsoft Azure Marketplace Step 2 – Configure the Resource Connector Virtual Machine Step 3 – Connect to the Resource Connector Instance Deploy a Connector in Docker Prerequisites Deployment Guidelines Host or VM Requirements Supported Host OS Procedure Set Up the Resource Connector and Container Launch the Resource Connector in the Docker Container View the Deployed Resource Connectors in Secure Access Troubleshoot Container Deployments Setup Failures Rate Limit with Docker Pull Connectivity Issues Check the Container's Status Get the Version of the Docker Container Image Stop the Container Restart the Container Delete the Container About the Diagnostic and Techsupport Scripts Run Diagnostic and Techsupport Scripts Determine the Number of Connectors Needed in a Connector Group Prerequisites Procedure Assign Private Resources to a Connector Group Guidelines for Assigning a Private Resource to a Connector Group Prerequisites Procedure View a Connector Group's Connectors and Assigned Resources Prerequisites Procedure Edit a Resource Connector Group Prerequisites Guidelines for Configuring Domains and DNS Servers on Connectors Groups Procedure Edit the Name of the Connector Group Add Domains and DNS Servers for the Connector Group Remove All Configured DNS Servers and Domains Edit Configured Domains and DNS Servers for the Connector Group Disable, Revoke, or Delete Resource Connectors and Groups About Disabling a Resource Connector About Revoking a Resource Connector About Deleting a Resource Connector Disable, Revoke, or Delete a Connector Disable or Delete a Resource Connector Group Maintain and Monitor Resource Connectors and Connector Groups Resource Connector Software Updates Troubleshooting Connector Software Updates Connector Platform Operating System (OS) Updates Monitor Connector and Connector Group Status Check Connector Group Status on the Overview Page Check Connector Group Status on the Connector Groups Page Check Connector Status Increase Connector Group Capacity Check Connector CPU Load Troubleshoot Resource Connectors and Connector Groups General Troubleshooting About Resource Connector Issues Throughput Capacity is Less Than Expected Users Cannot Connect to Private Resources Connector Software Auto-Upgrade Fails Connector Operating System (OS) Version has Security Vulnerabilities Manage Access Control and Vulnerabilities for Containers Connector is Expired Check the Status of Your Connector (VMware Only) View Connector Diagnostic Information Check for an Expired Connector in Secure Access Clean Up an Expired Connector Delete the Connector Container Stop a Connector Stop the Connector Container Unable to Revoke or Delete a Connector Unable to Sync Connector-Related Status Graphs are not Current (Container Only) Connector Troubleshooting Tools Supported Linux Commands Run Diagnostic or Techsupport Scripts Troubleshoot Container Deployments (VM Only) Connector Diagnostics (CLI) Supported Commands Run the Diagnostic Command Diagnostic Codes Diagnostic Codes for Connector Update Issues Diagnostic Codes for Other Connector Issues Supported Standard Linux Troubleshooting Commands Secure Access Regions Manage Users, Groups, and Endpoint Devices Get Started with User Configuration Management Step 1 – Manage User Directories Step 2 – Manage User Authentication Profiles Get Started with Endpoint Device Management View Provisioned Users and Groups Manage Remote Access VPN and Zero Trust Device Connections View User Details Prerequisites Procedure View Users Provisioned in Secure Access View User Details General Devices and Connectivity Groups and Events Associated Rules View Group and Organizational Unit Details Prerequisites Procedure Group Details General Group Details Organizational Unit Details View Endpoint Device Details Prerequisites Procedure View Details for Endpoint Devices View a Configured AD Device General Associated Rules Unenroll Devices for Client-Based Zero Trust Access Reenroll the User Device on the Secure Client Prerequisites Procedure Disconnect Remote Access VPN Sessions Prerequisites Procedure Manage User Directories and Device Management About Configuring Multiple Cloud Provisioning IdPs Configure User Directory Integrations Manage User Directory Integrations Configure Active Directory Endpoint Device Management Configure User Directory Integrations Prerequisites Procedure View Directories Next Steps Manage Cloud Identity Providers Add a Cloud Identity Provider Prerequisites Requirements Procedure View an Integrated Cloud Provider What's Next Edit an Identity Provider Integration Prerequisites Procedure Delete an Identity Provider Integration Prerequisites Procedure Import Users and Groups from CSV File Prerequisites CSV File Format CSV File Fields Procedure View Provisioned Users and Groups in Secure Access Manage Active Directory Integration Prerequisites Procedure Download the Active Directory Components Edit the Active Directory Connector Auto-Upgrades Edit Authentication Properties for the AD Integration View Active Directory Components Manage Sites for AD Components Delete Active Directory Integration Manage Google Workspace Account Prerequisites Procedure Manage Imported Users and Groups Prerequisites Procedure Upload a New CSV File with Users and Groups Delete an Imported CSV File Manage Advanced Configuration Settings Prerequisites Procedure Set Up Authentication Preferences for Identity Providers Set Up IP Surrogates for SSO User Authentication Set Up API Authentication Manage IP Surrogates for User Authentication Prerequisites How HTTPS Inspection Works Procedure Enable IP Surrogates for User Authentication Add Internal Networks for Bypass Delete Internal Networks for Bypass Configure Identity Providers Prerequisites Procedure Provision Users and Groups from Okta Prerequisites Limits and Best Practices Supported Features Configure the Cisco User Management Connector App in Okta Step 1 – Add the Cisco User Management Connector App in Okta Step 2 – Add the Secure Access SCIM Token and URL in the App Step 3 – Configure User Options in the App Step 4 – (Optional) Add a New Attribute (Optional) Add an objectGUID Attribute and Create the User Profile Mapping Add the objectGUID Attribute Create the User Profile Mappings Step 5 – (Optional) Provision Custom Attribute to Authenticate Users (Optional) Provision authName Attribute to Authenticate Users Prerequisites Customize the authName Attribute Map the Custom authName Attribute to a User Profile (Optional) Force-Sync Existing Users Step 6 – Assign Users or Groups in the App Step 7 – Push Users or Groups from the App to Secure Access Step 8 – View Logs in the App View Provisioned Users and Groups in Secure Access Refresh SCIM Token Provision Users and Groups from Microsoft Entra ID Prerequisites Limitations Procedure Configure Provisioning in Microsoft Entra ID Supported Attributes for Users Supported Attributes for Groups Configure Guest Users View Provisioned Users and Groups in Secure Access Refresh SCIM Token Provision Users, Groups, and Endpoint Devices from Active Directory Next Steps Prerequisites for AD Connectors Connector Server Outbound Network Access to Secure Access Connector Account Connect Multiple Active Directory Domains Manage AD Components Add AD Components in Secure Access Prerequisites Support for Multiple AD Domains and AD Forests Procedure Verify Auditing of Logon Events on Domain Controllers Download the Windows Configuration Script for Domain Controllers Run the Windows Configuration Script for the Domain Controllers Add a Domain Controller in Secure Access Add a Domain in Secure Access Manage Sites for AD Components Prerequisites Procedure Edit a Site View AD Components in Secure Access Prerequisites Procedure View AD Components in Secure Access Delete AD Components Prerequisites Procedure Delete an AD Component Remove All AD Components Manage AD Connectors How to Connect Active Directory to Secure Access Configure Authentication for AD Connectors and VAs How to Set Up Your API Credentials Prerequisites Procedure Step 1 – Create the Key Admin API Key Credentials Step 2 – Add the Key Admin API Key Credentials Refresh Client API Key and Secret Reset Client API Key Configure Updates on AD Connectors Prerequisites Procedure Connect Active Directory to Secure Access Prerequisites Procedure Step 1 – Download the Active Directory Connector Step 2 - Install the Active Directory Connector (Optional) Specify AD Groups in Selective Sync File Rename Selective Sync File After Upgrading to AD Connector v1.14.4 Create AD Groups in a Selective Sync File Supported Organizational Units Unsupported Organizational Units Sample File Entries Total Number of Groups Selected for Synchronization Deploy LDIF Files for AD Connector Best Practices for LDIF Source Deployments Requirements Known Limitations Prerequisites Procedure Step 1 – Download the Active Directory Connector Step 2 – Install the Cisco AD Connector Step 3 – Deploy the LDIF Source Files Troubleshooting Scenario 1 Scenario 2 Scenario 3 Scenario 4 Analyze Logs Change the Connector Account Password Prerequisites Procedure AD Connector Communication Flow and Troubleshooting Communication Flow Troubleshooting Network Requirements Restart the Active Directory Connector Edit AD Authentication Properties Best Practices: Configuring the AD Authentication Properties Prerequisites Procedure AD Integration with Virtual Appliances Network Diagram for VA Deployments How to Set Up AD Components with VAs Prerequisites for AD Connectors and VAs Connector Server Guidelines for AD Deployments with Secure Access Virtual Appliances Outbound Network Access to Secure Access Connector Account Guidelines for AD Deployments with Secure Access Virtual Appliances Prepare Your AD Environment About the AD Connector and Logon Events Prerequisites Additional Prerequisites for the Windows Event Log Collector Procedure Integrate AD with Domain Controllers Support for Multiple AD Domains and AD Forests Verify Auditing of Logon Events on Domain Controllers Download the Windows Configuration Script for Domain Controllers Run the Windows Configuration Script for the Domain Controllers Add a Domain Controller in Secure Access View the Registered AD Components in Secure Access Integrate AD with a Centralized Windows Event Log Collector Step 1 – Add the Windows Event Log Collector in Secure Access Step 2 – Add the AD Domains in Secure Access Connect Active Directory to VAs How to Configure the Setup of the AD Connector Prerequisites (Optional) Specify AD Groups in Selective Sync File Rename Selective Sync File After Upgrading to AD Connector v1.14.4 Create AD Groups in a Selective Sync File Supported Organizational Units Unsupported Organizational Units Sample File Entries Total Number of Groups Selected for Synchronization Procedure Step 1 – Set Up Domain Controllers Step 2 – Download the Active Directory Connector Step 3 - Install the Active Directory Connector Step 4 – View the Installed AD Components in Secure Access Change Connector Account Password Configure Updates to AD Connectors Multiple AD Domains with Secure Access Sites Prerequisites Active Directory Sites and Secure Access Sites Active Directory Sites and Services Secure Access Sites When to Use Secure Access Sites Caveats Use Secure Access Sites Active Directory Only Manage User Authentication Profiles Add User Authentication Profiles About Single Sign-On View User Authentication Profiles Edit a User Authentication Profile Delete a User Authentication Profile Add SSO Authentication Profiles Requirements for Configuring SSO Authentication Profiles About the Default Provisioning Profile Prerequisites Procedure View SSO Authentication Profiles About Single Sign-On for Users Sign-On for Provisioned Users Scenario Sample Sign-On Window Sign-On for Non-Provisioned Users Scenario Sample Sign-On Window Edit an SSO Authentication Profile Prerequisites (OIDC Only) Get Metadata for OIDC Configuration URL Procedure Edit SAML User Authentication Profile Edit OIDC User Authentication Profile Delete SSO Authentication Profile Prerequisites Procedure Delete SAML User Authentication Profile Delete OIDC User Authentication Profile Configure Integrations with OIDC Identity Providers About Using OpenID Connect with Secure Access Use Cases – SSO Authentication Secure Internet Access—Networks and Network Tunnels Zero Trust Access with the Cisco Secure Client Zero Trust Access with an Unmanaged Device Configure Identity Providers for OIDC Authentication Secure Access Redirect URI Configure Okta for OpenID Connect Prerequisites Verify the UPN and preferred_username Mapping Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Configure the Identity Provider's OIDC Metadata Step 3a – Add the Secure Access Redirect URI in Okta Step 3b – Configure the Core Grants in Okta Step 3c – Get the Okta OIDC Client ID and Secret Step 3d – Get the Okta OIDC Configuration URL Step 4 – Add the OIDC Metadata in Secure Access Configure Microsoft Entra ID for OpenID Connect Prerequisites Bypass Domains from SSL Decryption Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Configure the Identity Provider's OIDC Metadata Step 3a – Add the Secure Access Redirect URI in Entra ID Step 3b – Get the Client ID and Secret for Entra ID OIDC Step 3c – Get the Tenant ID for Entra ID OIDC Step 4 – Add the OIDC Metadata in Secure Access Configure Integrations with SAML Identity Providers Use Cases Secure Internet Access—Networks and Network Tunnels Zero Trust Access with the Cisco Secure Client Zero Trust Access with an Unmanaged Device Configure Identity Providers for SAML Authentication Prerequisites for SAML Authentication Secure Access Service Provider Metadata Requirements Enable SAML and Decryption in the Security Profile Encrypted SAML Assertions Configure Microsoft Entra ID for SAML Prerequisites Bypass Domains from SSL Decryption Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Add the Identity Provider's SAML Metadata to Secure Access Step 3a – Download the Secure Access Service Provider files Step 3b – Add Secure Access Service Provider Metadata to Entra ID Step 3c – Add the Azure SAML Metadata to Secure Access Test the Identity Provider Integration View the SAML Certificates in Secure Access Configure Okta for SAML Prerequisites Procedure Step 1 – Add SSO Authentication Profile in Secure Access Step 2 – Select Okta SAML Identity Provider in Secure Access Step 3 – Download the Secure Access SP Metadata and Certificates Step 4 – Configure the Okta App Integration Step 5 – Add Okta Metadata in Secure Access Configure Okta with the Secure Access SAML Metadata Get Metadata from Okta App Integration Test the Identity Provider Integration View the SAML Certificates in Secure Access Configure AD FS for SAML Prerequisites Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Add the Identity Provider's SAML Metadata to Secure Access Step 3a – Download the Secure Access Service Provider files Step 3b – Add the Secure Access Service Provider Metadata to AD FS Step 3c – Add the AD FS SAML Metadata to Secure Access Test the Identity Provider Integration View the SAML Certificates in Secure Access Configure Duo Security for SAML Prerequisites Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Add the Identity Provider's SAML Metadata to Secure Access Step 3a – Download the Secure Access Service Provider files Step 3b – Add Secure Access Service Provider Metadata to Duo Security Step 3c – Add the Duo Security SAML Metadata to Secure Access Test the Identity Provider Integration View the SAML Certificates in Secure Access Configure Ping Identity for SAML Prerequisites Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Add the Identity Provider's SAML Metadata to Secure Access Step 3a – Download the Secure Access Service Provider files Step 3b – Add the Identity Provider's SAML Metadata Step 3c – Add the Ping Identity SAML Metadata to Secure Access Test the Identity Provider Integration View the SAML Certificates in Secure Access Configure OpenAM for SAML Prerequisites Procedure Step 1 – Choose an Authentication Method Step 2 – Add an Identity Provider Step 3 – Add the Identity Provider's SAML Metadata to Secure Access Step 3a – Download the Secure Access Service Provider files Step 3b – Add Secure Access Service Provider Metadata to OpenAM Step 3c – Add the OpenAM Metadata to Secure Access Test the Identity Provider Integration View the SAML Certificates in Secure Access SAML Certificate Renewal Options Known Limitations Automatic Configuration Through the Fixed Metadata URL Prerequisites Manual Import of the Secure Access SAML Certificate Test SAML Identity Provider Integration Prerequisites Procedure Manage End-User Connectivity DNS Servers Traffic Steering for Cisco Secure Client Connections Virtual Private Networks Settings and Profiles Internet Security FQDNs for Network Connections About Fully Qualified Domain Names (FQDNs) Secure Access Global FQDN Secure Access Regional FQDNs Secure Access VPN Headend FQDN Manage DNS and DDNS Servers Manage DNS Servers Add a DNS Server View DNS Servers Edit a DNS Server Delete a DNS Server Map DNS Servers to Regions Prerequisites Procedure Manage DDNS Servers Prerequisites About Configuring DDNS Servers Add a DDNS Server Group View DDNS Servers Edit a DDNS Server Map DDNS Servers to Regions Prerequisites and Guidelines Procedure Manage Virtual Private Networks How to Manage Remote Access VPNs in Secure Access Manage Regions and IP Pools Prerequisites Procedure Add a Region Configuration Add an IP Pool Prerequisites Procedure Add an IP Pool Add a RADIUS Group (optional) Assign and Modify IP Pools Prerequisites Procedure Assign an IP Pool Modify IP Pools Modify IP Pool Assignment Manage RADIUS Servers and Groups RADIUS and AAA Guidelines Groups SAML Support Manage VPN Profiles Add VPN Profiles Prerequisites Step 1 – General Settings Step 2 – Authentication, Authorization, and Accounting SAML Authenticate with CA certificates SAML Configuration SAML Metadata XML Configuration Manual Configuration RADIUS Certificate Step 3 – Traffic Steering (Split Tunnel) Step 3a – Traffic Steering (Split Tunnel) Step 3b – Proxy and DNS Steering Settings Step 4 – Cisco Secure Client Configuration Add a RADIUS Group Prerequisites Procedure Manage VPN Settings Restrict manual host entries Manage Machine Tunnels About the VPN Machine Tunnel Limitations Prerequisites Procedure Step 1 – General Settings Step 2 – Authentication for Machine Certificate Step 3 – Traffic Steering (Split Tunnel) Step 4 – Cisco Secure Client Configuration Machine Tunnel - What to do Next Authenticate Device Identity with Active Directory Prerequisites Procedure Step 1: Configure Active Directory Endpoint Device Management Download the Active Directory Components Edit the Active Directory Connector Auto-Upgrades View Active Directory Components Manage Sites for AD Components Delete Active Directory Integration Step 2: Authenticate Active Directory Devices Step 3: Use Active Directory Devices as Sources in Access Rules View Endpoint Device Details in Secure Access Provision a Machine Tunnel User Prerequisites Procedure View Provisioned Users and Groups in Secure Access Manage Application-Based Remote Access VPN (Per App VPN) Benefits Manage Custom Attributes About Per APP VPN About Bypass Virtual Subnets About Cisco Secure Client on Mobile Devices Guidelines and Limitations for Secure Client AnyConnect on Android Guidelines and Limitations for Secure Client AnyConnect on Apple iOS Define Custom Attributes Prerequisites Supported Platforms Limitations Define Per App VPN Custom Attributes Step 1 - Determine the Application IDs for Mobile Applications Step 2 - Create a Base64 Encoded String for Each Mobile Application Step 3 - Create a Custom Attribute Object Define Bypass Virtual Subnets Custom Attributes Procedure Edit Cisco Secure Client Settings Procedure Manage Secure Client Scripts Guidelines and Limitations Prerequisites Enable Secure Client Scripts Upload Secure Client Scripts Traffic Steering for Zero Trust Access Client-Based Connections Best Practices Limits: Zero Trust Traffic Steering Rules Windows or macOS iOS Android: Samsung, Chrome and Generic Prerequisites Procedure View Zero Trust Traffic Rules Add a Zero Trust Traffic Rule Edit a Zero Trust Traffic Rule Delete a Zero Trust Traffic Rule Using Wildcards to Configure Traffic Steering for Private Destinations Exception Prerequisites Procedure Traffic Steering for ZTA Connections to Internet and SaaS Destinations Procedure Addresses That Never Use Zero Trust Access IPv6 IPv4 Zero Trust Access to Internet Destinations Solution Overview Trusted Networks for Zero Trust Access Connections Prerequisites Procedure Manage Internet Security Download Cisco Secure Client or Copy Secure Access PAC File URL Add Bypass Domains and Set Up Internet Security Next Steps Set Up Internet Security on User Devices Prerequisites Visibility of User Identities in Policy Rules Procedure Download the OrgInfo.json File Copy the PAC File URL Manage Internet Security Bypass About Internet Security Bypass Set Up Internet Security Bypass Add Destinations for Internet Security Bypass Prerequisites Procedure Steer Traffic to Secure Access or Bypass Domains View Destinations for Internet Security Bypass Edit Destination for Internet Security Bypass Prerequisites Procedure Delete Destination for Internet Security Bypass Prerequisites Procedure Configure Cisco Secure Client Settings Prerequisites Procedure Configure Security Settings Configure DNS and Web Security Configure Advanced Security Settings Use Active Directory for Access Policy Third Party VPN Compatibility DNS Protection DNS Backoff Settings Secure Web Gateway Backoff Settings Manage PAC Files Requirements for Downloading PAC Files to User Devices Supported Versions of the Secure Client for PAC Files About Using the Secure Client with PAC Files Managing PAC File Deployments Deploy the Secure Access PAC File for Windows Prerequisites Supported Versions of the Secure Client for PAC Files Copy URL for Default PAC File or Custom PAC File Copy URL for the the Secure Access PAC File Copy URL for Custom PAC File Procedure Deploy the Secure Access PAC File URL for Chrome and Edge Browsers Deploy the Secure Access PAC File URL for Firefox Deploy the Secure Access PAC File for macOS Prerequisites Supported Versions of the Secure Client for PAC Files Copy URL for Default PAC File or Custom PAC File Copy URL for Secure Access PAC File Copy URL for Custom PAC File Procedure Deploy the Secure Access PAC File URL to Chrome Deploy the Secure Access PAC File URL to Firefox Deploy the Secure Access PAC File URL to Safari Customize the Secure Access PAC File Prerequisites Procedure Copy the Secure Access PAC File Download the Secure Access PAC File Edit the PAC File Upload Custom PAC Files to Secure Access Prerequisites Requirements for Uploading Custom PAC Files in Secure Access Procedure Uploading Custom PAC File and Error Conditions Manage Uploaded Custom PAC Files View Custom PAC Files in Secure Access Copy URL for Custom PAC File Replace Custom PAC File Rename Custom PAC File Manage Proxy Chaining Network Requirements Forwarded-For (XFF) Configuration On-Premises XFF Header Configuration (No Plug-In) Guidelines Browser Plugin XFF Header Configuration (No Proxy Chaining) Manage Registered Networks Add Network Resources Prerequisites Dynamic IP Address—IPv4 Only Procedure Step 1 – Select the Network Step 2 – Configure the Network Resource Step 3 – Change the DNS Settings on Your Relevant Network Device Step 4 – Apply a Policy Rule to the Network Resource Step 5 – Test Your Network Point Your DNS to Cisco Secure Access Cisco Secure Access DNS Resolvers – IP addresses Cisco Secure Access DNS Resolvers – Anycast IP Addresses Prerequisites Procedure Step 1 – Identify Where Your Public DNS Server Addresses are Configured Step 2 – Log Into the Server or Router Where DNS is Configured Step 3 – Change Your DNS Server Addresses Primary and Secondary Servers Step 4 – Test Your New DNS Settings Clear Your DNS Cache Prerequisites Clear Your DNS Cache on Computers and Servers Windows 7 and Earlier Windows 8 and Newer OS X 10.4 TIGER OS X 10.5 and 10.6 LEOPARD OS X 10.7 and 10.8 Lion OS X 10.9 and 10.10 Linux Ubuntu Linux Clear Your DNS Cache on Browsers Internet Explorer 8 and Newer – Windows Mozilla Firefox – Windows Apple Safari – macOS Apple Safari – macOS Google Chrome – Windows Google Chrome – macOS Update a Network Resource Prerequisites Edit the Registered Network Resource Name Update the Registered Network Resource Delete a Network Resource Prerequisites Procedure Manage Internal Networks Add Resources to Associate with Internal Networks Add Internal Network Resources Prerequisites Add Resources to Associate with Internal Networks Procedure Update an Internal Network Resource Prerequisites Procedure Delete an Internal Network Resource Prerequisites Procedure Manage Sites How to Add and Associate Sites in Secure Access Manage Destination Lists Best Practices How to Format Your Destination List Add a Destination List Prerequisites Procedure Upload Destinations From a File Prerequisites Procedure Edit a Destination List Prerequisites Procedure Download Destinations to a CSV File Prerequisites Procedure Control Access to Custom URLs Prerequisites Block a URL URL Normalization URL Normalization for Destination Lists Troubleshooting Unblocked URLs Reporting for Blocked URLs Examples Troubleshooting Wildcards in Destination Lists Guidelines Domains and Wildcards Unsupported Domain Entries in Destination Lists URLs and Right-Side Wildcarding Troubleshoot Destination Lists Destination Lists and Common Error Conditions Manage AAA Servers Manage Schedules About Configuring Schedule Resources Guidelines for Creating Schedules Get Started with Schedules Add a Schedule Prerequisites Procedure View and Manage Schedules Prerequisites Procedure View Schedules in Secure Access Edit a Schedule Delete a Schedule Manage Internet and SaaS Resources Manage Application Lists Add an Application List Prerequisites Procedure What's Next Application Categories Category Descriptions Delete an Application List Prerequisites Procedure Manage Content Category Lists Available Content Categories Add a Content Category List Prerequisites Procedure Request a Category for an Uncategorized Destination Prerequisites Procedure Dispute a Content Category Prerequisites Procedure View Content Categories in Reports Prerequisites View Content Categories in Activity Search Report View Content Categories in Top Threats Report View Content Categories in Total Requests Report View Content Categories in Activity Volume Report View Content Categories in Top Destinations Report View Content Categories in Top Categories Report Manage Tenant Control Profiles Add a Tenant Controls Profile Prerequisites Procedure Control Cloud Access to Microsoft 365 Prerequisites Procedure Control Cloud Access to Google G Suite Prerequisites Limitations Procedure Control Cloud Access to Slack Prerequisites Procedure Control Cloud Access to Dropbox Prerequisites Procedure Control Cloud Access to YouTube Prerequisites Procedure Use Tenant Controls in Access Rules Review Tenant Controls Through Reports Prerequisites Procedure Manage Network Devices Prerequisites How to Add a Network Device in Secure Access Procedure View the Network Devices in Secure Access Edit a Network Device Remove a Network Device Manage Roaming Devices View Internet Security Settings for Roaming Devices Prerequisites Procedure Host Information Secure Web Gateway Security Information – IPv4 Security Information – IPv6 Edit Internet Security Settings for Roaming Devices Prerequisites Procedure Edit the Auto-Delete Interval for Roaming Devices Disable the Internet Security Settings Enable the Internet Security Settings Remove the Internet Security Override on Roaming Devices Delete a Roaming Device Prerequisites Procedure Manage Private Resources Step 1 – Configure Private Resources Optional Configuration for Private Resources Step 2 — Set Up Network Connections, VPN Profiles, and Certificates Step 3 — Add Private Resources in Policy Rules Step 4 — Set Up the Cisco Secure Client and Distribute URLs Add a Private Resource Prerequisites Define a Private Resource Communication with Secure Access Cloud Endpoint Connection Methods Zero-Trust Connections VPN Connections Resource Connector Groups Decryption View Access Rules Associated with a Private Resource What's Next Discover Private Resources Procedure Bulk actions Test Private Resource Reachability Prerequisites Procedure Test Results Add a Private Resource Group Prerequisites Procedure Private Resource Configuration Examples Private Resource located in multiple locations Catch-All Private Resource to Prevent Exposing Internal Networks Manage Connections to Private Destinations Using Private Resources for SaaS Internet Destinations Comparison of Zero Trust Access and VPN Zero Trust Access security benefits Zero Trust Access end user benefits Timeout Intervals for Zero Trust Access Sessions About Zero Trust Access Sessions ZTA Connections to Private Resources ZTA Connections to Private Resources with IPS or File Malware Scanning ZTA Connections to Internet Destinations Comparison of Client-Based and Browser-Based Zero Trust Access Connections About Client-Based Connections About Browser-Based Connections Requirements for Zero Trust Access Resource Requirements for Client-Based Zero Trust Access Resource Requirements for Browser-Based Zero Trust Access Network Requirements for Zero Trust Access Client Requirements for Client-Based Zero Trust Access Configure Client-Based Zero Trust Access for Private Destinations Configure Browser-Based Zero Trust Access to Private Resources Network Authentication for Zero Trust Access Connection Scenarios for Private Destinations Manage Branch Connections Endpoint Connection Methods Branch Networks in Private Access Rules Users and Groups Connections to Private Resources Sources for Branch Network Connections Destinations for Branch Network Connections Source Connections to Destinations Add an IPS Profile on Private Access Rules Log Connections From Branch Networks to Private Resources Allow SSH and RDP Access to Private Resources Browser-Based Zero Trust Access Configuration overview: Browser-based zero trust access using SSH or RDP Notes for browser-based SSH and RDP access Supported options for SSH access Client-Based Zero Trust Access Application Portal for Zero Trust Access Browser-Based User Access What Users Experience Requirements for Users and User Endpoint Devices Prerequisites Procedure (Optional) Modify Settings Get Started with Network and Service Objects About Network and Service Objects and Groups Benefits of Adding and Using Network and Service Objects General Limits for Objects General Limits for Groups Get Started with Network and Service Objects Network Objects and Network Object Groups Service Objects and Service Object Groups Quickstart: Network and Service Objects Prerequisites Procedure Access Rules with Network and Service Objects About Network or Service Objects in Access Rules Internet or Private Access Rules Using Network Objects for Sources in Access Rules Using Network and Service Objects for Destinations in Access Rules Combine Destinations with Boolean Logic How Destinations are Combined on Access Rules Logical AND Operator with Network and Service Objects Supported Combinations of Destinations with Logical AND Operator Manage Network Objects and Groups Get Started with Network Objects About Network Objects Add a Network Object Import a CSV File with Network Objects Manage a Network Object Get Started with Network Object Groups Add Network Object Groups Manage a Network Object Group View Network Objects and Groups Add a Network Object Guidelines: Add Network Objects in Secure Access Prerequisites Procedure Add a Network Object Group Guidelines: Add Network Object Groups in Secure Access Prerequisites Procedure Import CSV File of Network Objects Guidelines: Import Network Objects in Secure Access Prerequisites Procedure Examples of Valid CSV Files CSV File with Network Object of FQDN Type CSV File with Network Object of Host Type CSV File with Network Object of Network Type CSV File with Network Object of Range Type Manage a Network Object Prerequisites Procedure Edit a Network Object Duplicate a Network Object Delete a Network Object Manage a Network Object Group Prerequisites Procedure View Objects, Groups and Values in a Network Object Group Edit a Network Object Group Duplicate a Network Object Group Delete a Network Object Group View Network Objects and Groups Prerequisites Procedure Manage Service Objects and Groups Get Started with Service Objects About Service Objects Add a Service Object Import CSV File with Service Objects Manage a Service Object Get Started with Service Object Groups Add Service Object Groups Manage a Service Object Group View Service Objects and Groups Add a Service Object Prerequisites Guidelines: Add Service Objects in Secure Access Procedure Add a Service Object Group Guidelines: Add Service Object Groups in Secure Access Prerequisites Procedure Import CSV File of Service Objects Guidelines: Import Service Objects in Secure Access Prerequisites Procedure Examples of Valid CSV Files CSV File with Service Object and UDP Protocol CSV File with Service Object and TCP Protocol CSV File with Service Object and ICMP Protocol CSV File with Service Object and Any Protocols and Port Range Manage a Service Object Prerequisites Procedure Edit a Service Object Duplicate a Service Object Delete a Service Object Manage a Service Object Group Prerequisites Procedure View Objects, Groups and Values in a Service Object Group Edit a Service Object Group Duplicate a Service Object Group Delete a Service Object Group View Service Objects and Groups Prerequisites Procedure Manage the Access Policy Private and Internet Access Rules in Your Policy Default Access Rules in Your Policy Rule Defaults and Global Settings About the Access Policy Best Practices Rule Data Show Additional Data on Your Access Rules Prerequisites Procedure Edit the Order of the Rules in Your Access Policy Rule Defaults: Default Settings for Access Rules Zero Trust Access: Endpoint Posture Profiles Zero Trust Access: User Authentication Interval User Authentication Default Interval Settings Intrusion Prevention (IPS) Security Profile Tenant Control Profile Manage Global Settings for Access Rules Prerequisites Procedure Display User Input Field on Warn Pages About the Warn Page User Input Field Microsoft 365 Compatibility Tenant Controls Limitations Decryption Disable Decryption for Specific Sources Decryption Logging Certificate Pinning Edit Rule Defaults and Global Settings Prerequisites Procedure Edit or View the Default Access Rules Default Internet Access Rule Default Private Access Rule View or Edit Default Access Rules Using Wildcard Masks on Access Rules Wildcard Masks in Composite Sources or Destinations Guidelines Examples of Wildcard Masks Get Started With Internet Access Rules Control Egress IP Address for Select SaaS Internet Destinations Components for Internet Access Rules Sources Destinations Rule Enforcement with Destination Lists and Fully Qualified Domain Names Reusable Destinations in Internet Access Rules Additional Configuration Options Security Controls Intrusion Prevention (IPS) Set Up Certificates for Decrypting Internet Traffic Configure Intrusion Prevention (IPS) Profiles Configure the Do Not Decrypt List for IPS Security Profile Configure Threat Category Settings Configure SSO Authentication Set Up Certificates for Decrypting Internet Traffic Configure Do Not Decrypt Lists (Optional) Configure Custom End-User Block and Warn Notifications Configure Security Profiles for Internet Access Tenant Controls Default Settings for Internet Access Rules Add an Internet Access Rule Prerequisites Procedure Access Options Disable or Enable the Rule Logging settings Summary Rule Name Rule Order Rule Action Pre-Configured Sources Composite Sources Pre-Configured Destinations Composite Destinations App Risk Profiles Advanced Application Controls Security Control Options Intrusion Prevention (IPS) Security Profile Tenant Control Profile Schedule Enablement Time and Date Advanced Security Controls Next Steps About Configuring Sources in Internet Access Rules Source Components for Internet Access Rules Composite Sources for Internet Access Rules Limitations of Composite Sources in Internet Rules IP Addresses, CIDR Blocks, and Wildcard Masks Adding Composite Sources Combining IPs, CIDRs, or Wildcard Masks on a Source Combining Multiple Sources in a Rule (Boolean logic) About Configuring Destinations in Internet Access Rules Number of Destinations in a Rule Guidelines: Adding Destinations on Internet Access Rules Pre-Configured Destinations on an Internet Rule Application Lists and Application Categories on an Internet Rule Application Protocols on an Internet Rule How Application Protocols Combine with Composite Destinations Network and Service Objects on Internet Access Rules Composite Destinations for Internet Access Rules Limitations of Composite Destinations IP Addresses, CIDR Blocks, and Wildcard Masks Ports Protocols Adding Composite Destinations Combining Destination Components as a Single Destination Combining Multiple Destinations in a Rule (Boolean Logic) Ensure Rule Matching for Encrypted Internet Traffic Block Internet Access to Geographic Locations Advanced Application Controls Applications with Advanced Controls Cloud Storage Collaboration Content Management Media Office Productivity P2P Social Networking Prerequisites Procedure Troubleshooting Global Settings for Internet Access Rules About Isolated Destinations Prerequisites Secure Access Prerequisites Browser Prerequisites Secure Access Package Support for RBI and Isolation Rules Isolate Any Isolate Risky Verifying Isolation Limitations of Isolation Isolate Downgrade Expired or Downgraded Package Support for RBI Isolate Rule Remediation Prerequisites Filter Isolate Rules Duplicate a Downgraded Isolate Rule Troubleshoot Internet Access Rules General troubleshooting tips Problems while creating the rule The Next button is unavailable Problems after creating a rule Internet traffic is unexpectedly blocked Internet traffic is unexpectedly allowed Internet Access rule is not matching traffic as expected Get Started With Private Access Rules Components for Private Access Rules Sources Destinations Private Resources Private Resource Groups Network Objects Network Object Groups Service Objects Service Object Groups Endpoint Posture Profiles (for Endpoint Requirements) Security Controls Intrusion Prevention (IPS) Security Profile, for File Inspection and File Type Controls Default Settings for Private Access Rules Add a Private Access Rule Prerequisites Set Up the Private Access Rule Enable the Rule and Edit Your Logging Settings Add a Rule Name Choose a Rule Order Step 1 — Specify Access Options Rule Action Pre-Configured Sources Composite Sources Pre-Configured Destinations Composite Destinations Endpoint Requirements User Authentication Requirements Step 2 — Configure Security Control Options Intrusion Prevention (IPS) Security Profile Summary About Configuring Sources in Private Access Rules Source Components for Private Access Rules Composite Sources for Private Access Rules Limitations of Composite Sources IP Addresses, CIDR Blocks, and Wildcard Masks Adding Composite Sources Combining IPs, CIDRs, or Wildcard Masks on a Source Combining Multiple Sources in a Rule (Boolean logic) About Configuring Destinations in Private Access Rules Destination Components for Private Access Rules Network and Service Objects on Private Access Rules Composite Destinations for Private Access Rules IP Addresses, CIDR Blocks, and Wildcard Masks Ports Protocols Adding Composite Destinations Combining Destination Components as a Single Destination Combining Multiple Destinations in a Rule (Boolean Logic) About ZTA Private Access Enforcement Most Specific Match Enforcement Mode Multi-App Match Enforcement Mode Examples Scenario 1: Multiple matching IP/CIDR destinations in different resources Scenario 2: Multiple matching FQDN destinations in different resources Scenario 3: Multiple matching rules by source and destination – rule ordering priority in effect Scenario 4: Tie-breaker scenarios for multiple valid resource destinations in matched rule Multi-App with Resolved IP Match Enforcement Mode Examples Scenario 1: FQDN resource-based rule at higher priority than IP resource-based rule Scenario 2: IP resource-based rule at higher priority than FQDN resource-based rule Scenario 3: Tie-breaker scenario for FQDN-IP overlap within the same rule About Endpoint Requirements in Access Rules Allowing Traffic from Users and Devices on the Network Global Settings for Private Access Rules Troubleshoot Private Access Rules General Troubleshooting Tips Problems While Creating a Rule Next button is not available Problems After Creating a Rule Traffic is unexpectedly blocked Traffic is unexpectedly allowed Rule does not match traffic as expected Get Started with the Cisco Assistant Prerequisites Procedure Cisco Assistant Navigation What's Next Add Rules with the Cisco Assistant Use Cases Capabilities of the Cisco Assistant Limitations Safeguards Procedure Enter a Natural Language Prompt to Generate Policy Rules Invalid Prompts Reporting Contextual Conversations Support Cisco Assistant Rule Examples Core Prompt Components Key Words for Prompts Private Access Rule Examples Allow Action Rule Block Action Rule Include an AND Operator with Allow or Block Action Rule Include a NOT Operator with Allow or Block Action Rule Internet Access Rule Examples Allow Action Rule Block Action Rule Warn Action Rule Isolate Action Rule Include an AND Operator with Allow or Block Action Rule Include a NOT Operator with Allow or Block Action Rule Additional Samples Find Documented Answers with the Cisco Assistant Best Practices for Prompts Contextual Conversations Troubleshoot with the Cisco Assistant Procedure Craft your prompt Event analysis Contextual Conversations What's Next Messages Generated by the Cisco Assistant Examples of Cisco Assistant Responses to Prompts Manage Endpoint Security About Endpoint Posture About Posture Profiles Endpoint Posture Assessment Endpoint Attributes Supported Operating Systems Zero Trust Connections VPN Connections Firewall Conditions Endpoint Security Agents System Password Enforcement Disk Encryption Supported Browsers Windows Registry Conditions Windows Domain Join File Conditions Process Conditions Certificate Conditions Prerequisites About Certificate Conditions Manage Zero Trust Access Posture Profiles Zero Trust Access Posture Attributes Add a Client-Based Zero Trust Access Posture Profile Prerequisites Procedure Add a Browser-Based Zero Trust Access Posture Profile Prerequisites Procedure Manage VPN Connection Posture Profiles VPN Posture Attributes Add a VPN Connection Posture Profile Prerequisites Procedure Manage IPS Profiles How IPS Works Hit Counts Cisco-Provided IPS Signature Lists Decryption is Required for Effective Intrusion Prevention Exceptions for Traffic That Should Not be Decrypted IPS is Used in Both Types of Access Rules Add a Custom IPS Signature List Prerequisites Procedure Reset a Signature's Action Manage Security Profiles Security Profiles for Internet Access Functionality Included in a Security Profile for Internet Access Decryption SSO Authentication Requirements for Enabling OIDC Authentication Requirements for Enabling SAML Authentication Requirements for Disabling SAML Authentication Security and Acceptable Use Controls End-User Notifications Get Started: Security Profiles for Internet Access Add a Security Profile for Internet Access Prerequisites Procedure Add a Security Profile Enable or Disable Decryption SSO Authentication Security and Acceptable Use Controls Threat Categories File Inspection File Type Blocking SafeSearch AI Supply Chain Blocking Configure End-User Notifications View Security Profiles Configure Additional Security Options Add a Security Profile on Internet Access Rules Edit a Security Profile Delete a Security Profile Enable SafeSearch Enable SafeSearch Confirm That SafeSearch is Working Google YouTube Yahoo Bing Security Profiles for Private Access Add a Security Profile for Private Access Prerequisites Procedure Next steps Manage App Risk Profiles App Risk Profile Attributes Add an App Risk Profile Prerequisites Procedure Manage Threat Categories Default Threat Category List Reporting on Threat Category Access Attempts Threat Category Descriptions Add a Threat Category List Prerequisites Procedure Dispute a Threat Categorization Prerequisites Procedure Manage File Inspection and File Analysis Overview of Configuring File Inspection and Analysis File Inspection Details Cisco Advanced Malware Protection (AMP) Antivirus Scanner Cisco Secure Malware Analytics (formerly Threat Grid) Details Supported Files and File Limitations Secure Malware Analytics Sandbox Enable File Inspection Prerequisites Procedure Enable File Analysis by Cisco Secure Malware Analytics Prerequisites Procedure Test File Inspection for Internet Access Prerequisites Procedure Block Page Diagnostic Information Monitor File Inspection and Analysis Activity Monitor and Review File Inspection and Analytics Monitor and Review Secure Malware Analytics Monitor File Submission Limits Troubleshoot File Inspection and Analysis General Troubleshooting Manage File Type Controls Enable File Type Controls About File Type Controls for Internet Access About File Type Controls for Private Access Prerequisites Procedure Enable File Type Blocking for Internet Access Enable File Type Blocking for Private Access File Types to Block Review File Type Controls Through Reports Prerequisites Procedure Manage Notification Pages View Notification Pages Displayed to End Users Display Custom Notification Pages to End Users About Warn Pages for Internet Access Traffic Warn Page: Click Link and Continue to Destination Warn Page: Enter Key Word and Continue to Destination Preview Notification Pages Prerequisites Procedure Create Custom Block and Warn Pages Prerequisites Create Custom Block and Warn Pages Link a Custom Notification Page Appearance to a Security Profile Next Steps Allow Users to Contact an Administrator Prerequisites Procedure Block Page IP Addresses IP Addresses for Secure Access Block Pages Domains for Secure Access Block Pages Manage Traffic Decryption Internet Access Features That Require Decryption Internet Traffic That Should Not Be Decrypted Decryption in Private Access Rules Decryption Settings Decryption Requires Certificates Decryption Logging Troubleshooting Decryption Important Information About Do Not Decrypt Lists Do Not Decrypt List for IPS Do Not Decrypt Lists for Security Profiles for Internet Access Differences Between IPS and Features in Security Profiles The System-Provided Do Not Decrypt List Limitation: Do Not Decrypt Based on Content Category Add a Do Not Decrypt List for Security Profiles for Internet Access Prerequisites Procedure Manage Certificates Certificate Installation Methods Certificates for Internet Decryption Certificates for Displaying Notifications Certificates for Decrypting Internet Traffic Option 1: Distribute Self-Signed Certificates to End-User Devices Option 2: Use a Signed Certificate for Decrypting Internet Traffic Install the Cisco Secure Access Root Certificate Prerequisites Download the Cisco Secure Access Root Certificate Automatically Install the Cisco Secure Access Root Certificate (For an Active Directory Network) Install the Cisco Secure Access Root Certificate with Group Policy Using the Microsoft Management Console (MMC) Install the Cisco Secure Access Root Certificate with Group Policy Using the Group Policy Management Console (GPMC) Install the Cisco Secure Access Root Certificate in Firefox Using Group Policy Install the Cisco Secure Access Root Certificate on Chromebooks Using the Google Admin Console Manually Install the Cisco Secure Access Root Certificate (Single Computer) Install the Cisco Secure Access Root Certificate in Edge or Chrome on Windows Install the Cisco Secure Access Root Certificate in Firefox on Windows Install the Cisco Secure Access Root Certificate in All Browsers on Mac OS X Install the Cisco Secure Access Root Certificate on Mac OS X Through the Command Line Install the Cisco Secure Access Root Certificate in Chromium or Chrome on Linux Add Customer CA Signed Root Certificate Prerequisites Certificate Requirements Install Root Certificate in Browsers Procedure View the Cisco Trusted Root Store Prerequisites Download the Cisco Trusted Union Root Bundle Extract the Certificates Step 1: Extract the Signing Certificate Step 2: Extract Certificate Bundle as Message Step 3: Extract PEM-Formatted Certificates From Bundle Step 4: Generate Individual Certificate Files Linux macOS View an Individual Certificate File Manage Certificates for Private Resource Decryption Prerequisites Install a Certificate Authority Certificate on a Private Resource Procedure View Notifications About Expired Private Resource Certificates Upload Private Resource Certificates Option 1: Upload or enter a certificate-key pair directly to the private resource Option 2: Upload a certificate and key to the Certificates page Certificates for Private Resource Decryption Certificates for SAML Authentication Manage SAML Certificates for Service Providers Prerequisites Procedure View Notifications About Expired Service Provider Certificates Download Web Security and Zero Trust Service Provider Certificates Download Virtual Private Network Service Provider Certificates Manage SAML VPN Service Provider Certificate Rotation Prerequisites Procedure View Notifications About Expired Service Provider Certificates Activate a New VPN Service Provider Certificate Manage SAML Certificates for Identity Providers Prerequisites Procedure View Notifications About Expired Identity Provider Certificates Manage Web Security and Zero Trust Identity Provider Certificates Manage Virtual Private Network Identity Provider Certificates VPN Certificates for User and Device Authentication Manage CA Certificates for VPN Connections and Zero Trust Access Enrollment Prerequisites Install an Identity Certificate on User Devices Procedures View Notifications About Expired CA Certificates for Client Authentication Upload Certificate Authority (CA) Certificates for client authentication View Uploaded CA Certificates Manage Certificate Revocation Settings View CA Certificate Details Change the Purpose of an Uploaded CA Certificate Delete a Client Authentication CA Certificate Expired Certificates Manage the Data Loss Prevention Policy Add a Real Time Rule to the Data Loss Prevention Policy Prerequisites Procedure Understand Exclusions in a Real Time Rule Supported Applications Add an SaaS API Rule to the Data Loss Prevention Policy Add an AI Guardrails Rule to the Data Loss Prevention Policy Prerequisites Procedure Discovery Scan Prerequisites Initiate a Discovery Scan Cancel a Discovery Scan Edit a Data Loss Prevention Rule Delete a Data Loss Prevention Rule Prerequisite Procedure Enable or Disable a Data Loss Prevention Rule Prerequisites Disable a Rule Enable a Rule Supported File and Form Types Best Practices for the Data Loss Protection Policy Manage Data Classifications Create a Data Classification Built-In Identifiers Machine Learning Identifiers Custom Identifiers Exact Data Match Identifiers Indexed Document Match Identifiers Prerequisites Procedure Copy and Customize a Built-In Data Classification PII Data Classification PCI Data Classification GDPR Data Classification HIPAA Data Classification Prerequisites Procedure Delete or Edit a Classification Prerequisites Delete a Classification Edit a Classification Create an Exact Data Match Identifier Prerequisites Procedure Index Data for an EDM Prerequisites Run the DLP Indexer to Create an EDM Identifier Update the Indexed Data Set Periodically Troubleshooting Exact Data Match Field Types Supported EDM Types Create an Indexed Document Match Identifier Prerequisites Limitations Create an Indexed Document Match Identifier Monitor the Indexed Data Set and Re-Index as Needed Troubleshooting Built-In Data Classifications Built-in Data Identifiers Tolerances Copy and Customize a Data Identifier Prerequisites Procedure Create a Custom Identifier Prerequisites Procedure Custom Regular Expression Patterns Limitations General Regex Syntax Regex Breadth Word Boundary Individual Data Identifiers Drug Name Health Condition ICD-10 Code US Person Name Manage AI Guardrails Data Classifications Create an AI Guardrails Data Classification Prerequisites Procedure Copy and Customize a Built-In AI Guardrails Data Classification Security Guardrail Safety Guardrail Privacy Guardrail Prerequisites Procedure Delete or Edit an AI Guardrails Data Classification Prerequisites Delete an AI Guardrails Data Classification Edit an AI Guardrails Data Classification Manage Secure ICAP Prerequisites Secure ICAP Integration Modify an ICAP Server Connection Disconnect from an ICAP Server Manage SaaS API Data Loss Prevention Enable SaaS API Data Loss Prevention for AWS Tenants Prerequisites Limitation Enable CloudTrail Event Logging for S3 Buckets and Objects Obtain Your AWS Account ID Authorize an AWS Tenant Create an AWS Stack Revoke Authorization Enable SaaS API Data Loss Prevention for Azure Tenants Prerequisites Limitation Authorize an Azure Tenant Run an Azure PowerShell Script to Obtain Account Information Revoke Authorization Enable SaaS API Data Loss Prevention for Box Tenants Prerequisites Authorize a Tenant Revoke Authorization Enable SaaS API Data Loss Prevention for Dropbox Tenants Prerequisites Limitation Authorize a Tenant Revoke Authorization Enable SaaS API Data Loss Prevention for Google Drive Tenants Prerequisites Validation Authorize a Tenant Revoke Authorization Enable SaaS API Data Loss Prevention for Microsoft 365 Tenants Prerequisites Authorize a Tenant Revoke Authorization Enable SaaS API Data Loss Prevention for ServiceNow Tenants Prerequisites Limitation Find the Instance Name for your ServiceNow admin Account Assign the oauth_user role to the ServiceNow admin Account Add an OAuth Client to Your ServiceNow Deployment Authorize a Tenant Revoke Authorization View the Cisco Quarantine Table in Service Now Enable SaaS API Data Loss Prevention for Slack Tenants Prerequisites Limitations Authorize a Tenant Revoke Authorization Enable SaaS API Data Loss Prevention for Webex Teams Prerequisites Authorize a Tenant Revoke Authorization Manage Cloud Malware Protection Cloud Access Security Broker Protection for Google Drive and Microsoft 365 Enable Cloud Malware Protection Prerequisites Procedure Revoke Authorization for a Platform Prerequisites Procedure Enable Cloud Malware Protection for AWS Tenants Prerequisites Limitation Enable CloudTrail Event Logging for S3 Buckets and Objects Obtain Your AWS Account ID Authorize a Tenant Create an AWS Stack Revoke Authorization Enable Cloud Malware Protection for Azure Tenants Prerequisites Limitation Authorize an Azure Tenant Run an Azure PowerShell Script to Obtain Account Information Revoke Authorization Enable Cloud Malware Protection for Box Tenants Prerequisites Limitations Verify Box Application Settings Authorize a Tenant Edit a Tenant Revoke Authorization Enable Cloud Malware Protection for Dropbox Tenants Prerequisites Limitations Authorize a Tenant Revoke Authorization Enable Cloud Access Security Broker Features for Google Drive Prerequisites Limitation Authorize a Tenant Edit a Tenant Revoke Authorization Enable Cloud Access Security Broker Protection for Microsoft 365 Tenants Prerequisites Limitations Authorize a Tenant Edit a Tenant Revoke Authorization Enable Cloud Malware Protection for ServiceNow Tenants Prerequisites Limitation Find the Instance Name for your ServiceNow admin Account Assign the oauth_user role to the ServiceNow admin Account Add an OAuth Client to Your ServiceNow Deployment Authorize a Tenant Edit a Tenant Revoke Authorization View the Cisco Quarantine Table in Service Now Enable Cloud Malware Protection for Slack Tenants Prerequisites Limitations Authorize a Tenant Edit a Tenant Revoke Authorization Enable Cloud Malware Protection for Webex Teams Prerequisites Authorize a Tenant Revoke Authorization Manage Logging Where are Logs Stored? Logging to the Secure Access Data Warehouse Logging to Amazon S3 Advantages and Disadvantages of Configuring a Cisco-Managed Bucket Enable Logging Prerequisites Procedure Enable Logging to Your Own S3 Bucket Prerequisites JSON Bucket Policy Procedure S3 Bucket Data Path Download Files From the S3 Bucket Locally Prerequisites Enable Logging to a Cisco-Managed S3 Bucket Best Practices for Rotating an S3 Bucket Key About the Notifications for the IAM Key Prerequisites Procedure Configure a Cisco-Managed S3 Bucket Rotate Keys on a Cisco-Managed S3 Bucket Get the S3 Bucket Data Path Sample S3 Bucket Data Path Verify Your Access to an S3 Bucket Download Files From the S3 Bucket Locally Sample Command Best Practices: Download Files From the S3 Bucket Change the Location of Event Data Logs Implications When You Change Data Warehouse Locations Log Retention Prerequisites Procedure Stop Logging Prerequisites Procedure Delete Logs Prerequisites Procedure Log Formats and Versioning Prerequisites Log File Name Formats Subfolders Find Your Log Schema Version Log Schema Versions View Your Log Schema Version and Last Sync Time Include Headers Log File Fields Estimate the Size of a Log Estimate the Size of an Exported Report Reports and CSV Formats Activity Search Report Zero Trust Access Activity Search Fields Top Categories Report Top Destinations Report Top Resources Report Admin Audit Log Formats Example Order of Fields in Admin Audit Log Optional V12 Log Header Format V12 Log Format Cloud Firewall Log Formats Example Order of Fields in the Cloud Firewall Log Optional V12 Log Header Format V12 Log Format Data Loss Prevention (DLP) Log Formats Example Order of Fields in the DLP Log Optional V12 Log Header Format V12 Log Formats DNS Log Formats Examples Order of Fields in the DNS Log Optional V12 Log Header Format V12 Log Formats File Events Log Formats Example Order of Fields in the File Events Log Optional V12 Log Header Format V12 Log Format IPS Log Formats Example Order of Fields in the IPS Log Optional V12 Log Header Format V12 Log Format Remote Access VPN Log Formats Examples Order of Fields in the RAVPN Log Optional V12 Log Header Format V12 Log Format Web Log Formats Example Order of Fields in the Web Log Optional V12 Log Header Format V12 Log Format Zero Trust Access Log Formats Example Order of Fields in Zero Trust Access Logs Optional V12 Log Header Format V12 Log Format Zero Trust Access Flow Log Formats Example Order of Fields in Zero Trust Access Flow Logs Optional V12 Log Header Format V12 Log Format Manage API Keys Add Secure Access API Keys Prerequisites Add API Key Refresh API Key Update API Key Delete API Key Add KeyAdmin API Keys Use Cases Prerequisites Add KeyAdmin API Key Refresh KeyAdmin API Key Update KeyAdmin API Key Delete KeyAdmin API Key Manage Accounts Add a New Account Prerequisites Procedure Edit Account Settings Prerequisites Procedure Delete an Account Prerequisites Procedure Hide Sources with De-identification Prerequisites Source Types Enable De-identification Disable De-identification Limitations DNS Forwarders Get Started with Virtual Appliances Supported Deployments How Secure Access Virtual Appliances Work Virtual Appliances and Granular Identity Information Without Virtual Appliances With Virtual Appliances Active Directory Integration Configure Granular Rules Prerequisites for Virtual Appliances Endpoint Software Virtual Appliance Requirements Networking Requirements Allow Connections to Various Domains and Services Network Time Protocol Servers Intrusion Protection Systems (IPS) and Deep Packet Inspection (DPI) Network Address Translation (NAT) Encrypting Traffic with DNSCrypt Virtual Appliance Deployment Guidelines Deploy Virtual Appliances in Pairs Multiple DNS Egresses Single DNS Egress Double NAT Virtual Appliance Sizing Guide High-Traffic Sites and Virtual Appliances AD Connector Sizing Guidelines Deployment Considerations Overall Latency Number of Secure Access Sites Number of Users for a VA Manage VAs in Secure Access Configure Authentication for Virtual Appliances How to Set Up Your API Credentials Procedure Step 1 – Create the Key Admin API Key Credentials Step 2 – Add the Key Admin API Key Credentials Refresh Client API Key and Secret Reset Client API Key Manage DNS Forwarders Procedure View the DNS Forwarders Sync the Configuration Settings to Deployed VAs Edit a Site Upgrade a Virtual Appliance Reset Password Delete a Virtual Appliance Manage Site for Virtual Appliance Procedure Add a Site Select a Site Rename a Site Delete a Site Configure Updates for Virtual Appliances How Secure Access Updates Your Virtual Appliance Procedure Configure Automatic Updates of Virtual Appliances Manually Configure Update of a Virtual Appliance Postpone Updates to Virtual Appliances Deploy Virtual Appliances Guidelines Deploy the Secure Access Virtual Appliances Deploy VAs in Hyper-V for Windows 2012 or Higher Prerequisites Configure Authentication for the Virtual Appliances Procedure Step 1 – Download and Extract the Hyper-V Installer Step 2 – Import the Virtual Appliance Step 3 – Copy and Rename Image Files Step 4 – Select Network Adapter Step 5 – Select Hard Drive Step 6 – Power on the Virtual Machine Step 7 – Repeat for the Second Virtual Appliance Deploy VAs in VMware Prerequisites Configure Authentication for the Virtual Appliances Procedure Step 1 – Download OVF Template Step 2 – Deploy OVF Template Step 3 – Deploy a Second Virtual Appliance Step 4 – Power on the Virtual Machines Deploy VAs in Microsoft Azure Prerequisites Configure Authentication for the Virtual Appliances Before You Begin Procedure Step 1 – Prepare the Virtual Appliance Image on Azure Step 2 – Launch the Virtual Appliance on Azure Deploy VAs in Amazon Web Services Prerequisites Configure Authentication for the Virtual Appliances Procedure Step 1 – Prepare the Virtual Appliance Amazon Machine Image Step 2 – Launch the Virtual Appliance on Amazon Web Services Deploy VAs in Google Cloud Platform Prerequisites Configure Authentication for the Virtual Appliances Procedure Step 1 – Prepare the Virtual Appliance Instance Template on GCP Step 2 – Launch the Virtual Appliance on Google Cloud Platform Deploy VAs in KVM Prerequisites Configure Authentication for the Virtual Appliances Procedure Step 1 – Create the qcow2 files for KVM Step 2 – Launch the Virtual Appliance on KVM Deploy VAs in Nutanix Prerequisites Configure Authentication for the Virtual Appliances Procedure Deploy VAs in Alibaba Cloud Prerequisites Configure Authentication for the Virtual Appliances Procedure Download and Extract the Hyper-V Installer Alibaba Cloud Setup Procedural Overview Create an Alibaba Virtual Private Cloud (VPC) Create a Bucket for the Secure Access VAs Configure a ZIP Package Decompression Rule Upload the Secure Access VHD Images to the OSS Bucket Create a Custom Image Deploy the Secure Access VAs from the Imported Custom Image What's Next First-time Login to Secure Access VA Related Topics Dual-NIC Support on the VA IP Addressing General Guidelines Support for IPv6 Addressing Anycast Configuration Support DNS Performance on Alibaba ECS Instances Extensions on Alibaba ECS Instances Configure Virtual Appliances Prerequisites Enter Configuration Mode on a VA Deployed on VMware, Hyper-V, or KVM Enter Configuration Mode on a VA Deployed in Azure, AWS, or Google Cloud Platform Configure the VA Through Configuration Mode Configure a Second VA Configure Settings on VAs Prerequisites Configure Rate Limiting Enable Rate Limits on a VA Disable Rate Limiting Check Status and Packet Drops Configure NTP Servers Add NTP Servers to the VA Remove NTP Servers View the VA's Current NTP Servers Configure Secure Access Resolvers Use the IPv4 Secure Access DNS Resolvers Use the Alternate Secure Access DNS Resolvers Use the IPv6 Secure Access DNS Resolvers Use the US-Only IPv4 Secure Access DNS Resolvers Use the US-Only IPv6 Secure Access DNS Resolvers Use the Saudi Arabia-Only IPv4 Secure Access DNS Resolvers Use the Saudi Arabia-Only IPv6 Secure Access DNS Resolvers Configure DNSSEC Support Configure VA to Preserve the DO Bit Turn Off the DO Bit Configure Logging to Remote Syslog Server Configure the Destination of the Remote Syslog Server Configure Log Export Internal DNS Configure Log Export Enable Health Configure Log Export Enable Admin Configure Log Export Enable All Configure Log Export Status Turn Off Logging Configure Dual-NIC Support on the VA Configure an Existing VA to Support Dual-NIC Deploy a New VA to Support Dual-NIC DMZ Mode Configure Anycast Configure Anycast over BGP on the VA Configure Load Balancing Add a Load Balancer Remove a Load Balancer Configure Identity Association Timeouts Configure API Key Credentials for Authentication Configure the Client ID and Client Secret Local DNS Forwarding Manage Domains in the VA Which domains should be added? (Optional) Add A and PTR Records for the VAs Configure Local DNS Servers on the VA Examples Test Virtual Appliance Deployments Prerequisites Resolve Public and Local DNS Queries Test with Endpoints Transition Production Traffic SNMP Monitoring for Virtual Appliances Enable SNMP Monitoring SNMPv2.x SNMPv3 Privacy Password Configure SNMP in Secure Access Virtual Appliance SNMP Command Syntax About SNMP Monitoring Standard OIDs Supported by the Virtual Appliance Extended OIDs Supported by the Virtual Appliance Troubleshoot Virtual Appliances Prerequisites Reset a Virtual Appliance's Password Use Configuration Mode to Troubleshoot Troubleshoot Intermittent DNS Resolution Failures on a VA Deployed on Azure Troubleshoot DNS Resolution in Configuration Mode Troubleshoot DNS Resolution Failures Behind a Firewall Experience Insights About Experience Insights Key Terms Onboard Experience Insights Prerequisites Procedure Step 1: ThousandEyes integration Step 2: Default test target Step 3: Unified collaboration application Step 4: ThousandEyes agent Result of Onboarding Cisco AI Assistant for Experience Insights Procedure Limitations Prompt examples Contextual Conversations Configure Experience Insights Procedure ThousandEyes Organization and Account Group Update Collaboration Application Edit Default Test Target Update Location of ThousandEyes Tenant and Data Storage Register ThousandEyes Agents View Endpoint Performance Map Procedure View Summary of Endpoints Endpoint Health Status Endpoint thresholds Network thresholds Wi-Fi Descriptions View Common SaaS Applications Procedure View User Dashboard Prerequisites Procedure User Details and Device Details Endpoint health Security Events Segment Visualization Collaboration Application Summary About Endpoint Agent Tests Manage endpoint tests in Secure Access Endpoint license usage Endpoint tests Default Endpoint tests Manage endpoint agents and tests in ThousandEyes Limitations Estimate Peak Traffic to Custom Targets for Default Endpoint Tests Calculate Estimated Peak Throughput of Test Traffic Mitigation Strategies Recovery Options Create HTTP Server Tests Prerequisites Zero Trust Access prerequisites: Procedure Create Network Tests Prerequisites Procedure View HTTP Server Test Results Procedure View HTTP Test Results for a Specific Endpoint View Network Test Results Procedure View Network Test Results for a Specific Endpoint Reports Monitor Secure Access with Reports Available Reports Export Report Data to CSV Prerequisites Procedure Bookmark and Share Reports Procedure Report Search Window and Retention Report Search Window Report Retention Report Scheduling Schedule a Report Procedure Check Your Spam Folder Unsubscribe From a Report Update a Scheduled Report Prerequisites Procedure Remote Access Log Report View the Remote Access Log Report View the Remote Access Log Report View Event Details Activity Search Report View and Customize the Activity Search Report View the Activity Search Report Customize the Activity Search Report Save Activity Search Report columns and filters for future use View Firewall Events in Activity Search Report Filter the Report by Firewall Requests View Firewall Event Details Firewall Event Details Fields View Web Events in Activity Search Report Filter the Report by Web Requests View Web Event Details Web Event Details Fields View Zero Trust Events in Activity Search Report Procedure Event Details Access Details Block Details Endpoint Details View Activity Search Report Actions See Full Details Filter Views Schedule an Activity Search Report Use Search and Advanced Search Prerequisites Search Wildcards Domains URLs File Names Advanced Search Security Activity Report View Activity and Details by Filters Procedure View Activity and Details by Event Type or Security Category Prerequisites Procedure Group Security Categories View an Event's Details Prerequisites Procedure Search for Security Activity Prerequisites Procedure Advanced Search Total Requests Report Prerequisites View Trends in the Total Requests Report Activity Volume Report Prerequisites View Requests by Volume of Activity View Activity Volume by Threat Categories Prevent Contain View Activity Volume by Policy Traffic View Trends App Discovery Report View the App Discovery Report Prerequisites View the App Discovery Report View the Highest Risk Apps Prerequisites Procedure Review Apps in the Apps Grid Prerequisites Procedure Configure Columns to Display Change the Label of an App View App Details Prerequisites Procedure Change App Details Prerequisites Change the Risk Score for an App Change the Label of an App Control Apps Prerequisites Procedure Control Application Lists Control Advanced Apps Prerequisites Procedure View Traffic Data Through SWG Service Prerequisites View Traffic View Traffic in the Apps Grid View Traffic in the App Details Top Destinations Report Prerequisites View the Top Destinations Report View Further Details Destination Details Prerequisites View the Destination Details View the Request Traffic View Requests by Blocked or Allowed View Requests Through Global Traffic % View the Access and Policy Details View Recent Activity View the Most Visited URL Paths Top Categories Report Prerequisites View the Top Categories Report Top Categories Quick View View Category in Other Reports Category Details Prerequisites View a Category's Details Overview View a Category's Traffic View the Activity Breakdown View the Traffic Bandwidth View a Category's Identities View the Category's Top Domains Third-Party Apps Report Prerequisites View the Third-Party Apps Report Search the Third-Party Apps Report Export the Third-Party Apps Report View App Details Prerequisites Procedure Cloud Malware Report Prerequisites View the Cloud Malware Report Use the Cloud Malware Report Quarantine a Malicious File Restore a Quarantined File Delete a Malicious File Dismiss an Item from the Report Export a Cloud Malware Report More Information Data Loss Prevention Report Prerequisites View Events View Details Delete File Quarantine File Restore File from Quarantine Use Advanced Search Discovery Prerequisite View a Discovery Scan Admin Audit Log Report Prerequisites Generate Admin Audit Log Report Export Admin Audit Log Report to an S3 Bucket Prerequisites Procedure AI Supply Chain Report Prerequisites Procedure More about Risk Categories Provided by Cisco Foundation AI Cisco Secure Client Cisco Secure Client Overview Get Started and Manage Client-based Zero Trust Access from Mobile Devices Set up the Zero Trust Access App for iOS Devices Guidelines and Limitations Configure Settings in Cisco Secure Access Install the App Have End Users Enroll in Zero Trust Access Notes for administrators Set up the Zero Trust Access App for Android Devices Configure Cisco Secure Access Install the App Notes for administrators Set up the Zero Trust Access App for Android on Samsung Devices Requirements and Prerequisites Configure Cisco Secure Access Install the App (Optional) Set up the Android device for Zero Trust Access using MDM Add the app to MDM Set up the App on the Samsung Device Enroll the Device in Zero Trust Access Notes for administrators Monitor and Troubleshoot the Zero Trust Access App from Mobile Devices Troubleshoot iOS Devices Troubleshoot Samsung Devices Running Android OS Troubleshoot access issues Get Started with Cisco Secure Client on Windows and macOS Devices Prerequisites Secure Access Requirements System Requirements Download the Cisco Secure Client Pre-Deployment Package Download Cisco Secure Client Step 1 - Navigate to the Download Cisco Secure Client window Step 2 - Download Cisco Secure Client Download the latest version of Secure Client from Secure Access Download the cloud-managed version of Secure Client Download a previous version of Secure Client from Cisco Secure Central Step 3 - Download configuration files Step 4 - Install Secure Client ThousandEyes Endpoint Agent Module Download the OrgInfo.json File Prerequisites Procedure Step 1 – Download the OrgInfo.json File Step 2 – Copy the OrgInfo.json File to the Target Directory Manual Installation of Cisco Secure Client (Windows and macOS) Mass Deployment Overview Remote Installation Profile Installation Customization Options Mass Deployment (Windows) (Optional) Package Customization Add Umbrella Profile Automated Installation (Windows) Install Cisco Secure Client Install the Umbrella Profile (Optional) Disable VPN Functionality (Post installation) Customize Windows Installation of Cisco Secure Client Procedure Deploy the Cisco Secure Client VPN Module Deploy the Cisco Secure Client Umbrella Roaming Security Module (Optional) Deploy Cisco Secure Client DART Hide Cisco Secure Client Modules from Add/Remove Programs List Optional OrgInfo.json Parameter Configurations Mass Deployment (macOS) (Optional) Package Customization Add Umbrella Profile (Optional) Disable VPN Functionality Save the .dmg image Automated Installation (macOS) Installation (Pre-Deployment Package) Installation (Web Deployment Package) Install Umbrella Profile (Optional) Disable VPN Functionality (Post-Installation) Allow Secure Client System Extensions Customize macOS Installation of Cisco Secure Client Procedure Step 1 – Make the .dmg Package Writeable Step 2 – Generate the Module Installation Configuration File Step 3 – Copy OrgInfo.json to Cisco Secure Client Installation Directory Step 4 – (Optional) Hide the VPN Module Step 5 – Customize the Cisco Secure Client Installation Modules Sample Customization Step 6 – Set Up the Correct Extension Permission Settings Step 7 – Install Secure Client with Selected Modules VPN Headend Deployment Secure Firewall Management Center and Secure Firewall Threat Defense Prerequisites to provision the Umbrella Module Procedure to enable Secure Client Umbrella Module in Management Center and Threat Defense (OPTIONAL) VPN Local Authentication (Management Center 7.0 or later required) Meraki Systems Manager (SM) Deployment Migration from Umbrella Roaming Client Install the Root Certificate for All Browsers Inspect and Decrypt HTTPS Traffic Render Block and Warn Pages Cloud Management Overview Deploying Cisco Secure Client Profiles Uploading the Orginfo.json profile Create a Deployment Post Deployment Additional Reference Additional References Remote Monitoring and Management Deployment Tutorials Manage Device Deployment Prerequisites for Device Deployment Management Add and Activate Deployment Key Manage Deployment Key Compromise Delete a Deployment Key Reverting to Using Legacy Deployment Implementation Backward Compatibility Manage Zero Trust Access using Cisco Secure Client 1. Install Cisco Secure Client 2. Enroll in Zero Trust Access Requirements for Secure Client with Zero Trust Access Choose Zero Trust Access Enrollment Methods for Your Organization Procedure Enroll Devices in Zero Trust Access Using Certificates Prerequisites Step 1 - Enable certificate-based enrollment for your organization Step 2 - Upload or choose a CA certificate Step 3 - Download the enrollment configuration file Step 4 - Install the enrollment configuration file on user devices Step 5 - Enrollment occurs Switch from SAML-based enrollment to Certificate-based enrollment Enroll Devices in Zero Trust Access Using SSO Authentication Prerequisites Recommended: Use MFA Authentication and Biometric Identity Procedure Troubleshoot Client-Based Zero Trust Access Pre-Enrollment Errors Enrollment Errors Post-Enrollment Errors Requests to Reauthenticate Unenroll a Device from Zero Trust Access Immediately unenroll a device Permanently unenroll a device Unenroll from the user endpoint device (for enrollments using SSO Authentication only) On Windows devices On macOS devices Manage Virtual Private Networks on Cisco Secure Client Prerequisites Download the Virtual Private Network XML Profile Prerequisites Procedure Step 1 – Download the Cisco Secure Client VPN Profile Step 2 – Copy the VPN Profile to the Target Directory CA Certificates for VPN Connections Manage Internet Security on Cisco Secure Client Umbrella Roaming Security Module Requirements System Requirements Network Requirements Secure Access DNS Block Pages Secure Access and SAML Identity Provider Domains Transport Layer Security Protocol Network Access Host Names Secure Access DNS Resolvers Encrypted DNS External DNS Resolution HTTP and HTTPS Secure Access DNS – Client Configuration Services Secure Access DNS – Client Sync Services Secure Access DNS and Web – Client Certificate Revocation Services Roaming Security DNS Requirements Internal Domains Domain Management Internal Domains List DNS Suffixes Operational Flow Configure Internal Domains Cisco Secure Client and External Queries Cisco Secure Client and Internal Queries Advanced Topics Unencrypted DNS Suffixes (Continued) Interpret Internet Security Diagnostics Prerequisites Procedure Generate the Diagnostic Report from the Cisco Secure Client Generate the Diagnostic Report on the Command Line DNS Protection Status Prerequisites Procedure DNS Protection Status Descriptions SWG Protection Status Prerequisites Procedure Secure Web Gateway Status Descriptions Managed iOS Cisco Security Connector: Secure Access Setup Guide Requirements Optionally Getting Started Quick Start Prerequisites Procedure 1. Install the Cisco Security Connector App 2. Add an Organization Administrator's Email Address 3. Register Your iOS Device Through Your MDM to Secure Access Unregister a Mobile Device Manage Device Deployment Prerequisites for Device Deployment Management Add and Activate Deployment Key Manage Deployment Key Compromise Delete a Deployment Key Reverting to Using Legacy Deployment Implementation Backward Compatibility Meraki Registration Anonymization Prerequisites Procedure Verify Push of Profile Config Anonymize Your Device Verify Secure Access on Your Device Verify Secure Access with Meraki Prerequisites Procedure Verify Local Operation on the iOS Device Verify Secure Access Verify Clarity Upgrade the Cisco Security Connector Uninstall the Cisco Security Connector Meraki Documentation Register an iOS Device Through Apple Configurator 2 Anonymization Prerequisites Procedure Verify Secure Access on Your Device IBM MaaS360 Registration Anonymization Prerequisites Procedure Verify Secure Access on Your iOS Device Intune Registration Anonymization Prerequisites Procedure Verify Secure Access on Your iOS Device Jamf Registration Prerequisites Procedure Alternate Configuration Anonymization Verify Secure Access on Your iOS Device MobileIron Registration Anonymization Prerequisites Procedure Verify Secure Access on Your iOS device MobileIron Configuration MobileIron Procedure MobileIron Cloud Configuration MobileIron On-Prem Configuration MobiConnect Registration Anonymization Prerequisites Procedure Verify Secure Access on Your iOS Device Workspace ONE Registration Anonymization Prerequisites Procedure Verify Secure Access on Your iOS Device Register an iOS Device Through a Generic MDM System Anonymization Prerequisites Procedure Verify That Your Device is Protected by Secure Access Apply an Access Policy to Your Mobile Device Prerequisites Procedure Anonymize Devices Prerequisites Procedure Export Device Data to CSV Procedure Troubleshooting Prerequisites Generate Diagnostics and Email the Secure Access Reports Generate Diagnostics and Share the Secure Access Reports Push the Cisco Root Certificate to Managed Devices Prerequisites Procedure Configure Cellular and Wifi Domains Prerequisites Procedure Configuring DNS Suffix Allow List Prerequisites Procedure Managed Android Secure Access Module for Cisco Secure Client (Android OS) Device Security Prerequisites Known Issues Deploy the Android Client Android Configuration Download Procedure Fail Close/Open Scenario Manage Device Deployment Prerequisites for Device Deployment Management Add and Activate Deployment Key Manage Deployment Key Compromise Delete a Deployment Key Reverting to Using Legacy Deployment Implementation Backward Compatibility Cisco Meraki MDM Add App to Cisco Meraki Add Configuration for App Push the App to Devices Push the Cisco Root Certificate MobileIron MDM Configure the App Push the App Push User Identities Push the Cisco Root Certificate VMware Workspace ONE Prerequisites for Deployment Procedure for Deployment Create Always On VPN Profile Add and Publish the Cisco Secure Client Application Microsoft Intune MDM Publish the Cisco Secure Client - AnyConnect App to Managed Android Devices Configure Secure Access Push User Identities Push the Cisco Root Certificate Samsung Knox MDM Register with the Enterprise Mobile Manager (EMM) Enroll Android Devices Push the App Set Managed Configuration Create Profile in Knox Manage Push User Identities Push the Cisco Root Certificate Push the Cisco Root Certificate to Devices Prerequisites Procedure Manage Identities Cisco Meraki Systems Manager Microsoft Intune Samsung Knox VMWare WorkspaceOne Access User Identities on the Secure Access Dashboard Configure Policy Based on User Identity Monitor User Activity Export Device Data to CSV Procedure Troubleshooting First Launch of App Is this a VPN to Secure Access? An Internal Site Isn't Loading Configuration Issues Check for VPN Connection and Policy Check Block Page Get the Android ID Fail Close/Open Scenario Check Device Registration Missing CA Certificate Org ID on Policy Page is 0 App Installation is Blocked Offboarding Users Known Issues Frequently Asked Questions Unmanaged Mobile Device Protection Unmanaged Mobile Device Protection Administrator Actions Prerequisites Procedure End-user Actions Android Prerequisites: Deployment Enrollment Enrollment by QR code Enrollment without Camera Access: Registration and Activation iOS Prerequisites Deployment Enrollment via Link Enrollment by QR code Registration and Activation Integrations Manage Third-Party Integrations Integration Modules Chrome Enterprise Browser Overview Prerequisites Procedure What to do Next Integrate ISE (Identity Services Engine) with Secure Access Solution Overview Components and Prerequisites Components Used Prerequisites Solution Workflow Connect Cisco ISE and Cisco pxGrid Cloud About Cisco pxGrid Cloud Cisco pxGrid Cloud Terminology Cisco pxGrid Cloud and Cisco ISE Integration Workflows Enable Cisco Security Cloud Exchange Integrate Cisco ISE with Secure Access Verify and Monitor Context Sharing Verify Context Sharing in Secure Access Activity Search in Secure Access Related Information Integrate Catalyst SD-WAN with Secure Access Solution Overview Components and Prerequisites Components Used Prerequisites Solution Workflow Related Information Configure Context Sharing Between Catalyst SD-WAN and Secure Access Prerequisites Generate API Key Pair for Context Sharing Create Cisco Secure Access Credentials Add Secure Service Edge (SSE) Policy Group Enable Context Sharing Verify and Monitor Context Sharing Verify Context Sharing in Secure Access Monitor Context Sharing in SD-WAN Manager Monitor Secure Access Tunnels using the CLI Activity Search in Secure Access Related Information Cisco Security for Chromebook Client About Cisco Security for Chromebooks Key benefits Prerequisites for Cisco Security for Chromebooks Client Limitations for Cisco Security for Chromebooks Integrate the Google Workspace Identity Service Limitations Procedure Deploy the Cisco Security for Chromebooks Client About DNS-Layer Protection About SWG-Layer Protection High-Level Steps for Deploying Cisco Security for Chromebook Client Step 1 Step 2 Bypass Internal Domains from DNS-over-HTTPS (DoH) Procedure Verification Enable Reporting for Private IP Address of Chromebook Device Prerequisites Procedure Verify Cisco Security for Chromebooks Client Deployment Procedure Export Device Data to CSV Procedure Manage Device Deployment Prerequisites for Device Deployment Management Add and Activate Deployment Key Manage Deployment Key Compromise Delete a Deployment Key Reverting to Using Legacy Deployment Implementation Backward Compatibility Troubleshoot Cisco Security for Chromebooks Client Deployment Procedure View Protection Status of Chromebook Devices Procedure Add Policies to a Chromebook Device Prerequisites Procedure Cisco Security for Chromebooks Client FAQ Google Workspace Identity Service FAQ