Step 3: Use Active Directory Devices as Sources in Access Rules
Secure Access has a single Access policy, which consists of policy rules and settings. Your private access and internet policy rules and the default policy rules control the access and security of your resources and protect the traffic in your organization.
Secure Access supports configuring security controls for sources and destinations (resources) on private and internet access rules. Once authenticated in Active Directory, user devices are available as sources in private access and internet access rules. You can select all endpoint devices in the organization, all existing and future AD devices, or individual AD devices.