Software Secure Access
Activity Manage

Cisco Secure Access Help Manage IPS Profiles How IPS Works

Last updated: Aug 07, 2025

How IPS Works

Secure Access IPS uses signature-based detection and provides an added layer of protection against threats such as malware, botnets, phishing, and command and control call backs. When IPS is enabled, it's enabled for your entire environment, including all of your network tunnels.

IPS Signature Lists contain signatures filtered by three actions:

  • Block—Signatures are screened for threats on your network and recorded in Activity Search.
  • Log Only—Signatures are recorded in Activity Search, but not screened for threats.
  • Ignore—Signatures are completely ignored and not recorded in Activity Search.