Software Secure Access
Activity Manage

Cisco Secure Access Help Get Started Step 4 – Configure Endpoints and Network Sources

Last updated: Aug 14, 2025

Step 4 – Configure Endpoints and Network Sources

The Get Started with Secure Access workflow guides you through the tasks in the What's Next step—configure your organization's user devices, add registered and internal networks to Secure Access, and configure IPS and endpoint posture profiles in policy rules.

Prerequisites