Software Secure Access
Activity Manage

Cisco Secure Access Help Manage Accounts Hide Sources with De-identification

Last updated: Aug 14, 2025

Hide Sources with De-identification

Some regions or organizations require restrictions to hide the sources of users making internet requests. To comply with these restrictions, you can hide source names when generating a report by enabling de-identification for a user. When enabled, a hash unique to that source replaces the source (identity) name.


 
You cannot enable or disable de-identification on your own account. At least two administrators are required to use this feature and any administrator can turn it on or off for another account.