Software Secure Access
Activity Manage

Cisco Secure Access Help Get Started Step 2 – Configure Access to Resources

Last updated: Aug 22, 2025

Step 2 – Configure Access to Resources

The Get Started with Secure Access workflow guides you through the tasks in the Secure Resources and Access step—secure your private resources, enable access controls on resources, and create policy rules. For more information, see Manage Private Resources.

Prerequisites