Step 4 – Configure Endpoints and Network Sources
The Get Started with Secure Access workflow guides you through the tasks in the What's Next step—configure your organization's user devices, add registered and internal networks to Secure Access, and configure IPS and endpoint posture profiles in policy rules.

Prerequisites
- Full Admin user role. For more information, see Manage Accounts.