Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Cisco Umbrella SIG User Guide

  • Cisco Umbrella SIG User Guide
    • Welcome to Cisco Umbrella
      • Start Protecting Your Systems
      • Find Your Organization ID
      • Determine Your Current Package
      • Umbrella Policies Overview
        • Traffic Flow Through Umbrella
        • How Umbrella Applies Policies
        • DNS Policy
        • Firewall Policy (CDFW)
        • Web Policy (SWG)
        • Data Loss Prevention (DLP) Policy
      • SWG Data Centers
      • Reserved IP
        • Deployment
        • Reporting
        • Configuration
        • Remote Browser Isolation
        • Reserved IP Surrender
        • Port Exhaustion
        • Maximum Sessions
        • Troubleshooting
        • Region of Data Centers
      • Reserved IP Supplemental Terms
      • Reserved IP Supplemental Terms - Archived
      • View Cloud Security Service Status
        • Cloud Security Platforms
          • Service Status Types
          • Cisco Umbrella
          • Cisco Secure Connect
          • Cisco Cloudlock
        • Scheduled Maintenance
        • Past Incidents
      • Contact Cisco Umbrella Support
      • Password Policy FAQs
    • Get Started
      • Set Up DNS-Layer Security
        • Step 1: Add a Network Identity
        • Step 2: Configure Your DNS Settings
        • Step 3: Set Up Clients, Network Devices, and Virtual Appliances (Optional)
          • Set Up an Umbrella Roaming Client or AnyConnect Roaming Security Module
          • Set Up an Umbrella Mobile Client App
          • Set Up a Network Device
          • Set Up a Chromebook Client
          • Set Up a Virtual Appliance
        • Step 4: Add a DNS Policy
        • Step 5: Test Your DNS Policies
      • Point Your DNS to Cisco Umbrella
        • Anycast IP Addresses
          • Step 1 – Find out where your public DNS server addresses are configured
          • Step 2 – Log into the server or router where DNS is configured
          • Step 3 – Change your DNS server addresses
          • Step 4 – Test Your New DNS Settings
      • Set Up Web Security
        • Step 1: Add a Network Identity (Optional)
        • Step 2: Set Up an IPsec Tunnel (Recommended)
        • Step 3: Set Up a PAC File, Proxy Chaining, or Roaming Computers
          • Set Up a PAC File
          • Set Up Proxy Chaining
          • Set Up AnyConnect Umbrella Roaming Security Module (Recommended)
        • Step 4: Add DNS, Web, and Firewall Policies
        • Step 5: Test Your DNS and Web Policies
      • Configure the Secure Web Gateway
        • Umbrella Intelligent Proxy
        • Umbrella Secure Web Gateway
        • Web Security Best Practices
      • Uninstalling Umbrella
    • Umbrella Integration with Secure Web Appliance
      • Known Limitations
      • Known Behavior
      • Add an API Key and Key Secret
      • Register Secure Web Appliance with Umbrella
      • Hybrid Policy
      • Hybrid Reporting
      • Configure Web Policies and Destination Lists
        • Configure Ruleset Identities of Web Policy
        • Configure Web Policy Rules
        • Configure Destination Lists
        • Configure Application Settings
        • Configure HTTPS Inspection Policies
        • Configure Active Directory (AD) Users and Groups
        • Configure Microsoft 365 Compatibility
      • Policy Features
    • Limitations and Range Limits
      • Data Retention
      • Average Bandwidth
    • Manage Identities
      • Add a Network Identity
        • Prerequisites
        • Procedure
          • Step 1 – Select the Appropriate Network
          • Step 2 – Set up the Network Identity
            • Dynamic IP Address—IPv4 Only
          • Step 3 – Change the DNS Settings on Your Relevant Network Device
          • Step 4 – Test Your Network
      • Delete a Network Identity
        • Prerequisites
        • Procedure
      • Identity and SIG Deployment
      • Add a Network Device
        • Prerequisites
        • Procedure
          • Step 1: Create a Network Devices API Key
          • Step 2: Register a Network Device
          • Step 3: Add Network Device to a DNS Policy
          • Step 4: Test Your Network Device Integration
      • Delete a Network Device
        • Prerequisites
        • Procedure
      • Find the Total Number of Identities in Your Organization
        • Prerequisites
        • Find the Total Number of Networks
        • Find the Total Number of Roaming Clients
        • Find the Total Number of Other Identity Types
    • Manage Domains
      • Add Internal Domains
        • Prerequisites
        • Procedure
      • Add External Domains and IPs
        • Prerequisites
        • Procedure
      • Bulk Upload External Domains and IPs
      • Wildcards and Domain Management
        • Known Limitations
    • Manage DNS Policies
      • Add a DNS Policy
        • Prerequisites
        • Part One—Set up the Policy Wizard
        • Part Two — Configure the Policy
          • 1. Configure Security Settings
          • 2. Configure Content Category Settings
          • 3. Configure Application Settings
          • 4. Configure Destination Lists
      • Test a DNS Policy
        • Prerequisites
        • Procedure
      • DNS Policy Settings
        • Umbrella DNS Policy Settings
      • DNS Policy Precedence
        • Match an Identity and Destination to a Policy
          • Identities without Active Directory Integration
          • Identities with Active Directory Integration
          • DNS Policy without Virtual Appliance
          • DNS Policy with Virtual Appliance
        • Configure Policy Order
        • Identity Combinations
        • Policies and Block Page Bypass Settings
      • Best Practices for DNS Policies
      • Enable SafeSearch for DNS Policies
        • Test Google, Youtube, and Bing
        • Test Through a Lookup From the Command Line
      • Group Roaming Computers with Tags
        • Prerequisites
        • Procedure
          • DNS Policies
    • Manage the Web Policy
      • Add a Ruleset to the Web Policy
        • Prerequisites
        • Procedure
      • Add Rules to a Ruleset
      • Test the Web Policy
        • Before You Start
        • Procedure
          • Results
      • Web Policy Precedence
        • Web Policy Rulesets
          • Add Identities to a Ruleset
          • Configure Security Settings
          • Set Up Rulesets
          • Match an Identity to a Ruleset
          • Active Directory User Identity Source
        • Web Policy Rules
          • Add Destinations
          • Define Actions
          • Apply Web Policy Rule
      • Best Practices for the Web Policy and Rulesets
      • Manage Global Settings
        • Certificate Error Handling
        • Microsoft 365 Compatibility
          • Tenant Controls
          • Limitations
          • Procedure
        • Protected Files Bypass
          • How Protected Files Bypass is Enabled and Disabled
          • Procedure
        • PAC Files
          • Prerequisites
          • Procedure
            • Copy the Umbrella PAC File
            • Download the Umbrella PAC File
            • Edit the PAC File
      • Confirm SafeSearch for a Web Policy Ruleset
        • Google
        • YouTube
        • Yahoo
        • Bing
      • Understand Isolated Destinations
        • Prerequisites
          • Umbrella Prerequisites
          • Browser Prerequisites
        • Umbrella Package RBI Add-Ons
        • Limitations of Isolation
        • Expired or Downgraded Add-Ons
      • Monitor Bandwidth Usage in the App Discovery Report
        • Prerequisites
        • Procedure
    • Manage the Data Loss Prevention Policy
      • Add a Real Time Rule to the Data Loss Prevention Policy
        • Prerequisites
        • Procedure
      • Understand Exclusions in a Real Time Rule
      • Supported Applications
      • Add a SaaS API Rule to the Data Loss Prevention Policy
      • Discovery Scan
        • Prerequisites
        • Initiate a Discovery Scan
        • Cancel a Discovery Scan
      • Edit a Data Loss Prevention Rule
        • Prerequisites
        • Procedure
      • Delete a Data Loss Prevention Rule
        • Prerequisite
        • Procedure
      • Enable or Disable a Data Loss Prevention Rule
        • Prerequisites
        • Disable a Rule
        • Enable a Rule
      • Supported File and Form Types
    • Manage the Firewall Policy
      • Add a Firewall Rule
        • Prerequisites
        • Procedure
        • Network Tunnel Identity
        • Firewall Rule Settings
      • Add an FQDN List to a Firewall Rule
        • Prerequisites
        • Limitations
        • Procedure
      • Delete a Firewall Rule
        • Prerequisites
        • Procedure
      • Configure IPS Settings for Firewall Policy
        • Prerequisites
        • Procedure
      • Change a Firewall Priority
        • Prerequisites
        • Procedure
      • Monitor Hit Count
        • Prerequisites
        • Procedure
      • Edit Hit Count
        • Prerequisites
        • Reset or Refresh the Hit Count
        • Configure the Hit Count Interval for a Firewall Policy
      • Review Firewall Logs in Reports
        • View Firewall Logs in Activity Search
        • View CDFW Events in the App Discovery Report
      • Check Protocol of Firewall Traffic
        • Prerequisites
        • Check Protocol in the Activity Search Report
        • Check Protocol in the Firewall Logs
    • Manage IPS
      • How IPS Works
        • Hit Counts
        • Default IPS Signature Lists
      • Configure IPS
    • Manage Security Settings
      • Add a DNS Security Setting
        • Prerequisites
        • Procedure
      • Add a Web Security Setting
        • Prerequisites
        • Procedure
      • Dispute a Security Categorization
        • Prerequisites
        • Submit Categorization Request Through Cisco Talos
        • Submit Categorization Request Through Umbrella
      • DNS Security Categories
        • Security Categories
        • Integrations Sub-Category
      • Web Security Categories
      • Third-party Security Integrations
      • Set Up Custom Integrations
        • Prerequisites
          • Additional Prerequisites for Cisco AMP Threat Grid
        • Create a Custom Integration URL
        • Enable Third-Party Platform Integration
        • Verify Custom Integration
          • View Threat Events In Umbrella
          • View Threat Events Through the Umbrella Enforcement API
          • View Admin Audit Log
        • Logging and Reports
          • View Reports
          • Access Logs in S3
      • Custom Integration Best Practices
        • Known Domains and Destination Lists
        • Benefits of Custom Destination Allow List
        • Add a Destination List
        • Delete a Domain from Custom Destination Block List
    • Manage Content Categories
      • Add a DNS Content Category Setting
        • Prerequisites
        • Procedure
      • Legacy DNS Content Category Definitions
        • Levels of Categorization
          • High, Moderate, and Low Category Levels
          • Custom Category Level
        • Content Categories Definitions
      • DNS Content Categories
        • Levels of Categorization
          • High, Moderate, and Low Category Levels
          • Custom Category Level
        • Content Categories Definitions
      • DNS Content Category Changes
        • Legacy Content Category Changes
        • New Content Categories
      • Add a Web Content Category Setting
        • Prerequisites
        • Procedure
      • Web Content Categories
      • Web Content Category Name Changes
        • Web Content Category Name Changes
        • New Web Categories
      • Migrate Content Categories
        • Prerequisites
        • Procedure
      • Dispute a Content Categorization
        • Submit Categorization Request Through Cisco Talos
        • Submit Categorization Request Through Umbrella
      • View Content Categories in Reports
        • Prerequisites
        • View Content Categories in Activity Search Report
        • View Content Categories in Top Threats Report
        • View Content Categories in Total Requests Report
        • View Content Categories in Activity Volume Report
        • View Content Categories in Top Destinations Report
        • View Content Categories in Top Categories Report
        • View Content Categories in Top Identities Report
    • Manage Data Classifications
      • Create a Data Classification
        • Built-In Identifiers
        • Machine Learning Identifiers
        • Custom Identifiers
        • Exact Data Match Identifiers
        • Indexed Document Match Identifiers
        • Prerequisites
        • Procedure
      • Copy and Customize a Built-In Data Classification
        • PII Data Classification
        • PCI Data Classification
        • GDPR Data Classification
        • HIPAA Data Classification
        • Prerequisites
        • Procedure
      • Delete or Edit a Classification
        • Prerequisites
        • Delete a Classification
        • Edit a Classification
      • Create an Exact Data Match Identifier
        • Prerequisites
        • Procedure
      • Index Data for an EDM
        • Prerequisites
        • Run the DLP Indexer to Create an EDM Identifier
        • Update the Indexed Data Set Periodically
        • Troubleshooting
      • Exact Data Match Field Types
        • Supported EDM Types
      • Create an Indexed Document Match Identifier
        • Prerequisites
        • Limitations
        • Create an Indexed Document Match Identifier
        • Monitor the Indexed Data Set and Re-Index as Needed
        • Troubleshooting
      • Built-In Data Classifications
    • Built-In Data Identifiers
      • Tolerances
    • Manage Application Settings
      • Add a DNS Application Setting
        • Prerequisites
        • Procedure
      • Add a Web Application Setting
        • Prerequisites
        • Procedure
      • Delete an Application Setting
        • Prerequisites
        • Procedure
      • Application Categories
        • Category Descriptions
      • Manage Advanced App Controls
        • Prerequisites
        • Control Apps in the Policy Application Settings
        • Control Apps in a Web Policy Rule
        • Apps with Advanced App Controls
        • Troubleshooting
    • Manage Tenant Controls
      • Control Cloud Access to Microsoft 365
        • Prerequisites
        • Procedure
      • Control Cloud Access to Google G Suite
        • Prerequisites
        • Limitations
        • Procedure
      • Control Cloud Access to Slack
        • Prerequisites
        • Procedure
      • Control Cloud Access to Dropbox
        • Prerequisites
        • Procedure
      • Review Tenant Controls Through Reports
        • Prerequisites
        • Procedure
    • Manage Destination Lists
      • Add a DNS Destination List
      • Add a Web Destination List
      • Add a SAML Bypass Destination List
        • Prerequisites
        • Procedure
      • Edit a Destination List
        • Prerequisites
        • Procedure
      • Add Destinations in Bulk
        • Prerequisites
        • Procedure
      • Download Destinations to a CSV File
        • Prerequisites
        • Procedure
      • Control Access to Custom URLs
        • Prerequisites
          • Enable the Intelligent Proxy—DNS Policy Only
          • Install a Root Certificate
        • Block a URL
          • URL Normalization
          • URL Normalization for Destination Lists
          • Troubleshooting Unblocked URLs
          • Reporting for Blocked URLs
        • Examples
        • Contact Support
      • Wildcards and Destination Lists
      • Add Top-Level Domains To Destination Lists
        • Prerequisites
        • Procedure
      • Add Punycode Domain Name to Destination List
        • What is Punycode?
        • Examples of Unicode and Punycode Encoded Strings
      • Test Your Destinations
      • Search for a Destination List
      • Troubleshoot DNS Destination Lists
        • DNS Destination Lists and Common Error Conditions
    • Manage File Analysis
      • File Inspection—DNS and Web Policies
        • Cisco Advanced Malware Protection (AMP)
        • Umbrella Antivirus
      • Secure Malware Analytics (Threat Grid)—Web Policy Only
        • Secure Malware Analytics (Threat Grid)
    • Manage File Type Control
      • Enable File Type Control
        • Prerequisites
        • Procedure
          • File Type Control Outcomes Through Rule Actions
      • File Types to Block
      • Review File Type Controls Through Reports
        • Prerequisites
        • Procedure
    • Manage Selective Decryption
      • Add a Web Selective Decryption List
        • Prerequisites
        • Procedure
      • Enable Certificate Error Handling
        • Prerequisites
        • Procedure
          • Step 1: Enable the Certificate Error Handling button
          • Step 2: Add a Domain
    • Manage Schedule Settings for the Web Policy
      • Add a New Schedule Setting for the Web Policy
        • Prerequisites
        • Procedure
    • Manage Certificates
      • Certificate Installation Methods
    • Manage the Intelligent Proxy
      • How the Intelligent Proxy Works
      • Advantages of Using the Intelligent Proxy
      • Sites That are Not Proxied by the Intelligent Proxy
      • Best Practices
      • SSL Decryption Requirements and Implementation
      • Selective Decryption
    • Manage Umbrella's PAC File
      • Requirements for Downloading PAC Files to User Devices
      • Supported Versions of the Secure Client for PAC Files
      • Managing PAC File Deployments
    • Manage Proxy Chaining
      • Forwarded-For (XFF) Configuration
        • On-Premise X-Forwarded-For Header Configuration (No Plug-In)
        • Browser Plugin X-Forwarded-For Header Configuration (No Proxy Chaining)
    • Customize Block and Warn Pages
      • Create a Custom Block Page
        • Prerequisites
        • Procedure
      • Create a Custom Warn Page
        • Prerequisites
        • Procedure
      • Allow Users to Contact an Administrator
        • Prerequisites
        • Procedure
      • Add a Custom Logo
        • Prerequisites
        • Procedure
      • Redirect to a Custom Block Page
        • Prerequisites
        • Procedure
      • Block Page IP Addresses
      • Set Up a Block Page Bypass User
        • Prerequisites
        • Procedure
          • Set up Block Page Bypass for an Existing User
          • Set Up Block Page Bypass for a New User
      • Create a Block Page Bypass Code
        • Prerequisites
        • Procedure
        • Delete a Block Page Bypass Code
      • Enable Block Page Bypass in a Policy
        • Prerequisites
        • Procedure
    • Manage Tunnels
      • Check Device Compatibility
        • IPsec Tunnel Requirements
        • Supported Devices for Setting Up IPsec Tunnels
        • Unsupported Network Devices for Setting Up IPsec Tunnels
      • Add Network Tunnel Identity
        • Prerequisites
        • Procedure
        • Configure Network Tunnel
        • Verify Tunnel Traffic in Umbrella
        • Add Tunnel to Umbrella Policies
      • Supported IPsec Parameters
        • Supported IPsec Parameters
      • Connect to Cisco Umbrella Through Tunnel
        • Data Centers with Automatic IPsec Failover
        • Data Centers without Automatic IPsec Failover
        • Tertiary/Disaster Recovery Data Centers
      • Monitor Network Tunnel Status
        • Prerequisites
        • Monitor Tunnel Status from Deployments
        • View Number of Active Network Tunnels from Overview Report
        • Cisco Catalyst SD-WAN Layer 7 Health Check
    • Network Tunnel Configuration
      • Prerequisites
      • Establish a Tunnel
        • Maximum Transmission Unit (MTU) Size
        • Tunnel Size
        • Client Reachable Prefixes
        • Throughput and Multiple Tunnels
      • Network Tunnel and Secure Web Gateway
        • Transparent Mode
        • Explicit Mode
      • Configuration Guides
    • Manage Accounts
      • Add a New Account
        • Prerequisites
        • Procedure
      • Delete an Account
        • Prerequisites
        • Procedure
      • Change Account Settings
        • Prerequisites
        • Procedure
      • Hide Identities with De-identification
        • Prerequisites
        • Identity Types
        • Enable De-identification
        • Disable De-identification
        • Limitations
    • Manage User Roles
      • Add a New User
        • Prerequisites
        • Procedure
      • Add a Custom User Role
        • Prerequisites
        • Procedure
    • Manage API Keys
      • Add Umbrella API Keys
        • Prerequisites
        • Add API Key
        • Refresh API Key
        • Update API Key
        • Delete API Key
      • Add Umbrella Legacy API Keys
        • Prerequisites
        • Generate Token
        • Refresh Token
        • Delete Token
      • Add Static API Keys
        • Prerequisites
        • Generate Token
        • Refresh Token
        • Delete Token
      • Add KeyAdmin API Keys
        • Prerequisites
        • Add KeyAdmin API Key
        • Refresh KeyAdmin API Key
        • Update KeyAdmin API Key
        • Delete KeyAdmin API Key
    • Manage Your Logs
      • Where are Logs Stored?
        • Logging to Umbrella's Data Warehouse
        • Logging to Amazon S3
        • Advantages and Disadvantages to Configuring a Cisco-Managed Bucket
    • Manage Authentication
      • Enable Two-Step Verification
        • Prerequisites
        • Procedure
      • Disable Two-Step Verification
        • Prerequisites
        • Procedure
      • Enable Cisco Security Cloud Sign On
        • Prerequisites
        • Procedure
      • Disable Cisco Security Cloud Sign On
        • Prerequisites
        • Procedure
      • Get Started with Single Sign-On
        • Prerequisites
        • How SSO Changes Logging In
      • Enable SSO with Duo
        • Prerequisites
        • Procedure
      • Enable SSO with PingID
        • Prerequisites
        • Procedure
          • Download the PingID XML metadata file:
      • Enable SSO with Okta
        • Prerequisites
        • Procedure
          • Download the Okta XML metadata file:
      • Enable SSO with OneLogin
        • Prerequisites
        • Procedure
          • Download the OneLogin XML metadata file:
      • Enable SSO with Azure
        • Prerequisites
        • Procedure
      • Enable SSO with Other IDPs
    • Manage Secure ICAP
      • Prerequisites
      • Secure ICAP Integration
      • Modify an ICAP Server Connection
      • Disconnect from an ICAP Server
    • Requirements for Salesforce Tenants for Cloud Malware and SaaS API DLP
      • Salesforce sObjects Supported for SaaS API DLP
      • Install or Update Node.js
      • Install the Salesforce CLI
      • Deploy the Salesforce Quarantine Package to your Salesforce Tenant
      • Log In to Your Salesforce Org
      • Set Permissions in Salesforce
    • Manage Cloud Malware Protection
      • Enable Cloud Malware Protection
      • Revoke Authorization for a Platform
      • Enable Cloud Malware Protection for AWS Tenants
        • Prerequisites
        • Limitation
        • Enable CloudTrail Event Logging for S3 Buckets and Objects
        • Obtain Your AWS Account ID
        • Authorize an AWS Tenant
        • Create an AWS Stack
        • Revoke Authorization
      • Enable Cloud Malware Protection for Azure Tenants
        • Prerequisites
        • Limitation
        • Authorize an Azure Tenant
        • Run an Azure PowerShell Script to Obtain Account Information
        • Revoke Authorization
      • Enable Cloud Malware Protection for Box Tenants
        • Prerequisites
        • Limitations
        • Verify Box Application Settings
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Dropbox Tenants
        • Prerequisites
        • Limitations
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Access Security Broker Features for Google Drive Tenants
        • Prerequisites
        • Limitation
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Access Security Broker Features for Microsoft 365 Tenants
        • Prerequisites
        • Limitations
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Salesforce Tenants
      • Edit a Salesforce Cloud Malware Tenant
      • Enable Cloud Malware Protection for ServiceNow Tenants
        • Prerequisites
        • Limitation
        • Find the Instance Name for your ServiceNow admin Account
        • Assign the oauth_user role to the ServiceNow admin Account
        • Add an OAuth Client to Your ServiceNow Deployment
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
        • View the Cisco Quarantine Table in Service Now
      • Enable Cloud Malware Protection for Slack Tenants
        • Prerequisites
        • Limitations
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
      • Enable Cloud Malware Protection for Webex Teams Tenants
        • Prerequisites
        • Limitation
        • Authorize a Tenant
        • Edit a Tenant
        • Revoke Authorization
    • Manage SaaS API Data Loss Prevention
      • Enable SaaS API Data Loss Protection for AWS Tenants
        • Prerequisites
        • Limitation
        • Enable CloudTrail Event Logging for S3 Buckets and Objects
        • Obtain Your AWS Account ID
        • Authorize an AWS Tenant
        • Create an AWS Stack
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Azure Tenants
        • Prerequisites
        • Limitation
        • Authorize an Azure Tenant
        • Run an Azure PowerShell Script to Obtain Account Information
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Box Tenants
        • Prerequisites
        • Limitation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Dropbox Tenants
        • Prerequisites
        • Limitation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Google Drive Tenants
        • Prerequisites
        • Validation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Microsoft 365 Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Salesforce Tenants
      • Enable SaaS API Data Loss Protection for ServiceNow Tenants
        • Prerequisites
        • Limitation
        • Find the Instance Name for your ServiceNow admin Account
        • Assign the oauth_user role to the ServiceNow admin Account
        • Add an OAuth Client to Your ServiceNow Deployment
        • Authorize a Tenant
        • Revoke Authorization
        • View the Cisco Quarantine Table in Service Now
      • Enable SaaS API Data Loss Protection for Slack Tenants
        • Prerequisites
        • Limitations
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Protection for Webex Teams Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
  • Identity Integrations
    • Introduction
      • Configure Identity Providers or Manually Import Users and Groups
    • Configure SAML Integrations
      • Prerequisites
      • SAML Certificate Renewal Options
        • Automatic Configuration Through the Umbrella Fixed Metadata URL
          • Prerequisites
        • Manual Import of the Umbrella Signing Certificate
      • Configure Azure AD for SAML
        • Prerequisites
          • Bypass Domains from HTTPS Decryption
        • Configure Azure AD
        • Configure Azure for SAML with Azure's Metadata Upload
        • Configure Azure for SAML Manually
      • Configure Okta for SAML
        • Prerequisites
        • Configure Okta for SAML with Metadata Upload
        • Configure Okta for SAML Manually
      • Configure AD FS for SAML
        • Prerequisites
        • Configure ADFS
        • Configure AD FS for SAML in Umbrella with Metadata Upload
        • Configure AD FS for SAML in Umbrella Manually
      • Configure Duo Security for Cisco Umbrella SAML
        • Prerequisites
        • Configure Cisco Duo Single Sign On (SSO) Application
        • Configure Cisco Umbrella for SAML with Metadata Upload
      • Configure PingID for SAML
        • Prerequisites
        • Configure PingID for SAML with Metadata Upload
        • Configure PingID for SAML Manually
      • Configure OpenAM for SAML
        • Prerequisites
        • Configure OpenAM for SAML with Metadata Upload
        • Configure OpenAM for SAML Manually
      • Configure Other IdPs for SAML
        • Prerequisites
        • Configure Your SAML IdP with Metadata Upload
        • Configure Your SAML IdP Manually
      • Enable IP Surrogates for SAML
        • Prerequisites
          • HTTPS Inspection
        • Map Tunnels to Sites
        • Enable IP Surrogates
        • Add a New IP Surrogate Bypass
        • Delete an IP Surrogate Bypass
        • View Identities in Activity Search
      • Configure SAML for Multiple EntityIDs
        • Prerequisites
        • Configure SAML for Multiple EntityIDs with Metadata Upload
        • Configure SAML for Multiple EntityIDs Manually
    • Provision Identities from Active Directory
      • Prerequisites for AD Connectors
        • Connector Server
        • Outbound Network Access to Cisco Umbrella
        • Connector Account
      • Configure Authentication for AD Connectors and VAs
        • How to Set Up Your API Credentials
        • Prerequisites
        • Procedure
          • Step 1 – Create the Key Admin API Key Credentials
          • Step 2 – Add the Key Admin API Key Credentials to Sites and Active Directory
        • Refresh API Key Credentials
        • Delete API Keys
      • Configure Updates on AD Connector
        • Prerequisites
        • Procedure
      • Connect Active Directory to Umbrella
        • How to Configure the Setup of the AD Connector
        • Prerequisites
        • Register a Domain Controller or Domain in the Umbrella Dashboard
          • Register a Domain Controller
          • Register a Domain
        • Specify AD Groups of Interest (Optional)
          • Rename Selective Sync File After Upgrading to AD Connector v1.14.4
          • Create AD Groups in a Selective Sync File
        • Install the Connector
        • Verify That the Connector Syncs with the Umbrella Dashboard
      • Deploy LDIF Files for AD Connector
        • Best Practices for LDIF Source Deployments
        • Requirements
        • Known Limitations
        • Prerequisites
        • Procedure
          • Step 1 – Download the Cisco AD Connector
          • Step 2 – Install the Cisco AD Connector
          • Step 3 – Deploy the LDIF Source Files
        • Verify the Connector Syncs with Umbrella
        • Troubleshooting
          • Scenario 1
          • Scenario 2
          • Scenario 3
          • Scenario 4
          • Analyze Logs
      • View AD Components in Umbrella
        • Prerequisites
        • Procedure
      • Connect Multiple Active Directory Domains to Umbrella
      • Change the Connector Account Password
        • Prerequisites
        • Procedure
      • Communication Flow and Troubleshooting
        • Communication Flow
        • Troubleshooting
    • Provision Identities Through Manual Import
      • Prerequisites
        • CSV File Structure
        • CSV File Fields
      • Procedure
    • Provision Identities from Microsoft Entra ID
      • Prerequisites
      • Limitations
      • Procedure
      • Configure Cisco User Management Connector App in Microsoft Entra ID
        • Supported Attributes for Users
        • Supported Attributes for Groups
      • Configure Guest Users
      • View Users and Groups in Umbrella
    • Provision Identities from Okta
      • Prerequisites
      • Limitations
      • Supported Features
      • Import the ObjectGUID Attribute from Okta
      • Configure the Cisco User Management Connector App
      • Troubleshooting
    • Active Directory Integration with Virtual Appliances
      • Network Diagram for VA Deployments
  • Reports
    • Get Started with Reports
      • Export Report Data to CSV
      • Bookmark and Share Reports
        • Prerequisites
        • Procedure
      • Report Retention
        • Admin Audit Log Retention
    • Schedule Reports
      • Schedule a Report
        • Prerequisites
        • Procedure
          • Unsubscribe From a Report
      • Update a Scheduled Report
        • Prerequisites
        • Procedure
    • Overview Report
      • Message Center
      • Deployment Health
      • Network Request Breakdown
        • DNS Requests
        • Total Web Requests
      • Firewall Breakdown
      • Security Categories
      • App Discovery and Control
      • Security Requests
      • File Retrospective
    • Security Activity Report
      • View Activity and Details by Filters
        • Prerequisites
        • Procedure
      • View Activity and Details by Event Type or Security Category
        • Prerequisites
        • Procedure
          • Group Security Categories
      • View an Event's Details
        • Prerequisites
        • Procedure
      • Search for Security Activity
        • Prerequisites
        • Procedure
          • Advanced Search
    • Activity Search Report
      • Prerequisites
      • Limitations
      • View the Activity Search Report
        • Configure Columns to Display
      • View Actions
        • See Full Details
        • Filter Views
        • Investigate View
      • Save Activity Search Report Columns and Filters for Future Use
      • Schedule an Activity Search Report
    • App Discovery Report
      • Prerequisites
      • View the Dashboard
    • Top Threats Report
      • Threat Type Details
        • View a Threat's Details
        • View a Threat Type's Requests
        • View the Threat Type's Impact on Your Environment
        • View More Details in Activity Search
      • Threat Type Definitions
    • Total Requests Report
      • Prerequisites
      • View Trends in the Total Requests Report
    • Activity Volume Report
      • Prerequisites
      • View Requests by Volume of Activity
      • View Activity Volume by Security Categories
        • Prevent
        • Contain
        • Integrations
      • View Activity Volume by Policy Traffic
      • View Trends
    • Top Destinations Report
      • Prerequisites
      • View the Top Destinations Report
        • Report Fields
      • View Further Details
    • Top Categories Report
      • Prerequisites
      • Top Categories Quick View
      • View the Top Categories Report
        • Report Fields
        • Sort by Traffic
        • Ascending or Descending Order
      • View Category in Other Reports
    • Top Identities Report
      • Prerequisites
      • View the Top Identities Report
        • Report Fields
      • View Identity in Other Reports
    • Admin Audit Log Report
      • Prerequisites
      • Generate Admin Audit Log Report
    • Cloud Malware Report
      • View the Cloud Malware Report
      • Use the Cloud Malware Report
        • View Detailed Information About a File
        • Quarantine a Malicious File
        • Restore a Quarantined File
        • Delete a Malicious File
        • Dismiss an Item from the Report
    • Data Loss Prevention Report
      • View Events
        • View Details
        • Delete File
        • Quarantine File
        • Restore File from Quarantine
        • Use Advanced Search
      • Discovery
        • Prerequisite
        • View a Discovery Scan
    • Third-Party Apps Report
      • Prerequisites
      • View the Third-Party Apps Report
      • Use Search
      • Use Advanced Search
      • Export the Third-Party Apps Report
  • Manage Roaming Client
    • Introduction
      • How the Roaming Client Works
      • Benefits of the Umbrella Roaming Client
      • VPN Support
      • Antivirus and Endpoint Security Software Support
      • Prerequisites
        • Operating System
        • Transport Layer Security Protocol
        • Network Access
        • Software
        • Internal Domains
    • Download and Install the Roaming Client
      • Single Machine or Manual Installation
      • Distributed or Automated Installation
    • Configure DNS Policies for Roaming Computers
      • Step 1: Create an On-network Policy
      • Step 2: Create an Off-network Policy
      • Step 3: Order your Policies Correctly
    • Identity Support for the Roaming Client
      • Prerequisites
      • On-Premises Identity
      • Procedure
      • Prerequisites for AD Integration
      • Configure Identities on macOS
      • LAN IP Address Reporting Only—No AD integration
      • Enhanced Roaming Client UI
      • AnyConnect Umbrella Roaming Security Module UI
      • Identity Support in Umbrella Policies
      • Identity Support in Umbrella Reports
        • View Traffic in Umbrella
      • What Information is Sent to Cisco Umbrella and When
        • AD Directory Structure
        • AD User ID
        • User Group
        • LAN IP Address
        • Device ID
    • Status, States, and Functionality
      • Status in the Umbrella Dashboard
      • Roaming Computer Information
        • Tray Icon Status
          • Status Indicators
        • Probes
          • Encrypted Probe
          • Unencrypted Probe
          • Virtual Appliance + Protected Network Probe
        • Advanced: Network Access per Service
        • Advanced: How the Umbrella Roaming Client Changes States
    • Virtual Appliances
      • Behavior
    • Troubleshooting
      • Scenarios
        • Did the Umbrella Roaming Client not Install?
        • Unable to Resolve Internal Resources
        • Installations Failures
        • Unregistered Umbrella Roaming Clients
        • Unprotected/Unencrypted
        • Switching States or Statuses Frequently (Flapping)
      • Logs
      • Diagnostic Tool
    • Domain Management
      • Domain Management
      • DNS Suffixes
      • Operational Flowchart
        • 1. Internal Domains
        • 2. External Queries
        • 3. Internal Queries
      • Advanced Topics
        • Unencrypted
        • Virtual Appliances
        • DHCP/Static DNS Servers
        • DNS Suffixes (Continued)
    • Configure Protected Networks for Roaming Computers
      • Roaming Computers on a Protected Network
      • Roaming Computers Off-Network
      • Prerequisites
      • Before You Begin
      • Configure Your DNS for Local Network
        • Test Your Configured DNS
      • Add Policies
        • Step 1: Add Networks to On-Network Policies
        • Step 2: Add Roaming Computers to Off-Network Policies
        • Step 3: Order Your Policies
      • Procedure
    • Roaming Computers Settings
      • Prerequisites
      • Procedure
        • General Settings
        • Client Settings
          • Secure Client Settings
          • Umbrella Roaming Client Settings
        • Backoff Settings
          • DNS Backoff Settings
          • Secure Web Gateway Backoff Settings
    • Encryption and Authentication
      • Concepts
      • DNSCrypt
      • DNSCrypt Versus DNSSEC
      • Encryption and Authentication
      • Encrypted State
      • Unencrypted State
    • Command-line and Customization for Installation
      • Prerequisites and Instructions
      • Parameters
        • Windows
          • Required Parameters
          • Optional Parameters
        • macOS
          • Optional Parameters
            • Deploy Through the Command Line
              • Windows
              • macOS
    • Remote Logging and Diagnostics
      • Objective
      • Privacy
      • Logs
      • The Diagnostic Tool
    • macOS Mobile Device Management
      • Prerequisites
      • Register to an Organization
      • Change Organizations
      • Add a User Identity
  • Umbrella Roaming Security: Cisco Secure Client
    • Introduction
    • Umbrella Roaming Security: Cisco Secure Client (formerly AnyConnect)
      • Prerequisites
        • System Requirements
          • Unsupported Operating Systems
        • Network Requirements
        • Roaming Client Prerequisites
      • Deploy Umbrella module in Cisco Secure Client
        • Manual Installation of Cisco Secure Client (Windows and macOS)
        • Mass Deployment Overview
        • Contents
        • Remote Installation
          • Profile Installation
          • Customization Options
        • Mass Deployment (Windows)
        • (Optional) Package Customization
          • Add Umbrella Profile
        • Automated Installation (Windows)
          • Install Cisco Secure Client
          • Install the Umbrella Profile
          • (Optional) Disable VPN Functionality (Post installation)
        • Customize Windows Installation of Cisco Secure Client
          • Procedure
            • Deploy the Cisco Secure Client VPN Module
            • Deploy the Cisco Secure Client Umbrella Roaming Security Module
            • (Optional) Deploy Cisco Secure Client DART
            • Hide Cisco Secure Client Modules from Add/Remove Programs List
          • Optional OrgInfo.json Parameter Configurations
        • Mass Deployment (macOS)
        • Contents
          • (Optional) Package Customization
            • Add Umbrella Profile
            • (Optional) Disable VPN Functionality
            • Save the .dmg image
          • Automated Installation (macOS)
            • Installation (Pre-Deployment Package)
            • Installation (Web Deployment Package)
            • Install Umbrella Profile
            • (Optional) Disable VPN Functionality (Post-Installation)
            • Allow Secure Client System Extensions
        • Customize macOS Installation of Cisco Secure Client
          • Procedure
          • Step 1 – Make the .dmg Package Writeable
          • Step 2 – Generate the Module Installation Configuration File
          • Step 3 – Copy OrgInfo.json to Cisco Secure Client Installation Directory
          • Step 4 – (Optional) Hide the VPN Module
          • Step 5 – Customize the Cisco Secure Client Installation Modules
            • Sample Customization
          • Step 6 – Set Up the Correct Extension Permission Settings
          • Step 7 – Install Secure Client with Selected Modules
          • Optional OrgInfo.json Parameter Configurations
        • VPN Headend Deployment
        • Secure Firewall Management Center and Secure Firewall Threat Defense
          • Prerequisites to provision the Umbrella Module
          • Procedure to enable Secure Client Umbrella Module in Management Center and Threat Defense
          • (OPTIONAL) VPN Local Authentication (Management Center 7.0 or later required)
        • Migration from Umbrella Roaming Client
        • Install the Root Certificate
        • Automatic Updates
        • Cloud Management
          • Contents
          • Overview
          • Deploying Cisco Secure Client
          • Profiles
          • Uploading the Orginfo.json profile
          • Create a Deployment
          • Post Deployment
            • Additional Reference
          • Additional References
          • Remote Monitoring and Management Deployment Tutorials
      • Meraki Systems Manager (SM) Deployment
      • Enable the Umbrella SWG Agent
      • DNS Protection Status
        • Prerequisites
        • Procedure
        • DNS Protection Status Descriptions
      • SWG Protection Status
        • Prerequisites
        • Procedure
        • Secure Web Gateway Status Descriptions
      • Interpret Diagnostics
    • Active Directory Policy Enforcement and Identities
      • Procedure
      • macOS User Identity
    • Virtual Appliances
      • Behavior
    • Domain Management
      • Domain Management
      • DNS Suffixes
      • Operational Flowchart
        • 1. Internal Domains
        • 2. External Queries
        • 3. Internal Queries
      • Advanced Topics
        • Unencrypted
        • Virtual Appliances
        • DNS Suffixes (Continued)
    • Configure Protected Networks for Roaming Computers
      • Roaming Computers on a Protected Network
      • Roaming Computers Off-Network
      • Prerequisites
      • Before You Begin
      • Configure Your DNS for Local Network
        • Test Your Configured DNS
      • Add Policies
        • Step 1: Add Networks to On-Network Policies
        • Step 2: Add Roaming Computers to Off-Network Policies
        • Step 3: Order Your Policies
      • Procedure
    • Roaming Computer Settings
      • Procedure
      • General Settings
      • Client Settings
        • Secure Client Settings
          • Umbrella Roaming Client Settings
      • Backoff Settings
        • DNS Backoff Settings
        • Secure Web Gateway Backoff Settings
  • Manage Virtual Appliance
    • Introduction
      • How Umbrella Virtual Appliances Work
      • Benefits of Virtual Appliances
    • Deploy Virtual Appliances
      • Configure Authentication for Virtual Appliances
        • How to Set Up Your API Credentials
        • Prerequisites
        • Procedure
          • Step 1 – Create the Key Admin API Key Credentials
          • Step 2 – Add the Key Admin API Key Credentials to Sites and Active Directory
        • Refresh API Key Credentials
        • Delete API Keys
          • Recreate API Key Credentials for Authentication
      • Deploy VAs in Hyper-V for Windows 2012 or Higher
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedure
        • 1. Download and Extract the Hyper-V Installer
        • 2. Import the Virtual Appliance
        • 3. Copy and Rename Image Files
        • 4. Select Network Adapter
        • 5. Select Hard Drive
        • 6. Power on the Virtual Machine
        • 7. Repeat for the Second Virtual Appliance
      • Deploy VAs in VMware
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedure
        • Step 1: Download OVF Template
        • Step 2: Deploy OVF Template
        • Step 3: Deploy a Second Virtual Appliance
        • Step 4: Power on the Virtual Machines
      • Deploy VAs in Microsoft Azure
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Before You Begin
        • Procedure
        • Step 1: Prepare the Virtual Appliance Image on Azure
        • Step 2: Launch the Virtual Appliance on Azure
      • Deploy VAs in Amazon Web Services
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedural Overview
        • 1. Prepare the Virtual Appliance Amazon Machine Image
        • 2. Launch the Virtual Appliance on Amazon Web Services
      • Deploy VAs in Google Cloud Platform
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedural Overview
        • Prepare the Virtual Appliance Instance Template on GCP
        • Launch the Virtual Appliance on Google Cloud Platform
      • Deploy VAs in KVM
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedural Overview
          • 1. Create the qcow2 files for KVM
          • 2. Launch the Virtual Appliance on KVM
      • Deploy VAs in Nutanix
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedure
      • Deploy VAs in Alibaba Cloud
        • Prerequisites
          • Configure Authentication for the Virtual Appliances
        • Procedure
        • Download and Extract the Hyper-V Installer
        • Alibaba Cloud Setup
          • Procedural Overview
          • Create an Alibaba Virtual Private Cloud (VPC)
          • Create a Bucket for the Umbrella VAs
          • Configure a ZIP Package Decompression Rule
          • Upload the Umbrella VHD Images to the OSS Bucket
        • Create a Custom Image
        • Deploy the Umbrella VAs from the Imported Custom Image
          • What to do Next
        • First-time Login to Umbrella VA
          • Related Topics
          • Dual-NIC Support on the VA
          • IP Addressing
            • General Guidelines
            • Support for IPv6 Addressing
          • Anycast Configuration Support
          • DNS Performance on Alibaba ECS Instances
          • Extensions on Alibaba ECS Instances
    • Configure Virtual Appliances
      • Prerequisites
      • Enter Configuration Mode on a VA Deployed on VMware, Hyper-V, or KVM
      • Enter Configuration Mode on a VA Deployed in Azure, AWS, or Google Cloud Platform
      • Configure the VA Through Configuration Mode
      • Add a Second VA
    • Local DNS Forwarding
      • Manage Domains in the VA
        • What format does the internal domains list accept?
        • Which domains should be added?
        • (Optional) Add A & PTR Records for the VAs
      • Configure Local DNS Servers on the VA
        • Examples
    • Reroute DNS
      • Test VAs
      • Test with Endpoints
      • Transition Production Traffic
    • Update Virtual Appliances
      • Prerequisites
      • Update Your Virtual Appliance
      • Configure Automatic Update of Virtual Appliances
      • Manual Update of a Virtual Appliance
      • Configure Automatic Update Postponement
    • Virtual Appliance Sizing Guide
      • Network Prerequisites
      • What is an Umbrella Virtual Appliance?
      • Connector Sizing Guidelines
      • Deployment Considerations
        • Overall Latency
        • Number of Umbrella Sites
        • Number of Users per VA
    • SNMP Monitoring
      • Enable SNMP Monitoring
        • SNMPv2.x
        • SNMPv3
        • Privacy Password
        • Configure SNMP in Umbrella Virtual Appliance
        • SNMP Command Syntax
      • About SNMP Monitoring
      • Standard OIDs Supported by the Virtual Appliance
      • Extended OIDs Supported by the Virtual Appliance
    • Troubleshoot Virtual Appliances
      • Reset a Virtual Appliance's Password
      • Use Configuration Mode to Troubleshoot
      • Establish a Support Tunnel From the VA
      • Troubleshoot Intermittent DNS Resolution Failures on a VA Deployed on Azure Platforms
      • Troubleshoot Intermittent DNS Resolution Failures on a VA Deployed on non-Azure Platforms
      • Troubleshoot DNS Resolution in Configuration Mode
      • Troubleshoot DNS Resolution Failures Behind a Firewall
    • Other Configurations
      • Configure Rate Limiting
      • Configure NTP Servers
        • Configure Umbrella Resolvers
        • Configure DNSSEC Support
        • Configure Logging to Remote Syslog Server
          • Turn Off the Logging
          • Configure Dual-NIC Support on the VA
            • Configure an Existing VA to Support Dual-NIC
            • Deploy a New VA to Support Dual-NIC DMZ Mode
          • Configure Anycast
            • Configure Anycast over BGP on the VA
            • Configure Load Balancing
            • Configure Identity Association Timeouts
            • Configure API Key Credentials for Authentication
              • Configure the Client ID and Client Secret
  • Sites and Internal Networks
    • Internal Networks Setup Guide
      • Set Up Internal Networks
    • Provision a Subnet for Your Virtual Appliance
      • Prerequisites
      • Procedure
      • Add an Internal Network and Sites
    • Manage Sites
      • Prerequisites
      • Before You Begin
      • Procedure
    • Manage Internal Networks
      • Prerequisites
      • Before You Begin
      • Internal Network Associations
      • Procedure
      • Apply Policies to Internal Network
    • Assign a DNS Policy to Your Site
  • Managed iOS Device
    • Cisco Security Connector: Umbrella Setup Guide
      • Requirements
        • Optionally
      • Getting Started
    • Meraki Registration
      • Prerequisites
      • Procedure
      • Verify Push of Profile Config
      • Anonymize Your Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
      • Verify Umbrella with Meraki
      • Meraki Documentation
    • IBM MaaS360 Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • Intune Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • Jamf Registration
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
        • Alternate Configuration
        • Anonymization
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • MobiConnect Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • MobileIron Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS device
      • Install Umbrella Root Certificate
    • Workspace ONE Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • Register an iOS Device Through a Generic MDM System
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Umbrella on Your iOS Device
      • Install Umbrella Root Certificate
    • Apply a DNS Policy to Your Mobile Device
      • Prerequisites
      • Procedure
        • Policy > Security Settings
        • Policy > Passive Reporting Mode
    • Add User Identity for Cisco Security Connector
      • Prerequisites
      • Procedure
      • Test Integration of User Identity With Cisco Security Connector
    • Anonymize Devices
    • Export Device Data to CSV
      • Procedure
    • Troubleshooting
      • Prerequisites
      • Generate Diagnostics and Email the Umbrella Reports
      • Generate Diagnostics and Share the Umbrella Reports
    • Push the Umbrella Certificate to Managed Devices
      • Prerequisites
      • Procedure
    • Configure Cellular and Wifi Domains
      • Prerequisites
      • Procedure
  • Managed Android Device
    • Cisco Secure Client (Android OS)
      • Device Security
      • Prerequisites
      • Known Issues
    • Deploy the Android Client
      • Download Configuration
      • MDM Configurations
      • Install Umbrella Root Certificate
    • Manage Identities
      • Cisco Meraki Systems Manager
      • Microsoft Intune
      • Samsung Knox
      • VMWare WorkspaceOne
      • Access User Identities on the Umbrella Dashboard
        • Configure DNS Policy
        • Monitor User Activity
    • Export Device Data to CSV
      • Procedure
    • Troubleshooting
      • Is this a VPN to Umbrella?
      • An Internal Site Isn't Loading
      • Configuration Issues
      • Check for VPN Connection and Policy
      • Check Block Page
      • Get the Android ID
      • Fail Close/Open Scenario
      • Check Device Registration
      • Missing CA Certificate
      • Org ID on Policy Page is 0
      • App Installation is Blocked
      • Offboarding Users
      • Known Issues
    • Frequently Asked Questions
  • Unmanaged Mobile Device Protection
    • Umbrella Unmanaged Mobile Device Protection
    • Administrator Actions
      • Prerequisites
      • Procedure
    • End-User Actions
      • Android
        • Known Limitations
        • Prerequisites
        • Deployment
        • Enrollment
        • Enrollment by QR code
        • Enrollment without Camera Access
        • Registration and Activation
      • iOS
        • Known Limitations
        • Prerequisites
        • Deployment
        • Enrollment by Link
        • Enrollment by QR code
        • Registration and Activation
  • Cisco Security for Chromebook Client
    • Get Started
      • Policies
    • Migration Scenarios
    • Prerequisites
    • Limitations
    • Google Workspace Identity Service
    • Integrate Google Workspace Identities
    • Deploy the Chromebook Client
      • DNS Layer Protection
      • SWG Layer Protection
      • Deploy Cisco Security for Chromebook Client
        • Umbrella Dashboard
        • Google Admin Console
          • Configure Default Template
          • Configure Managed Guest Session Template
    • Protection Status
      • Umbrella Security for Chromebook Client States
    • Chromebook-Specific DNS Policy
      • Prerequisites
      • Procedure
    • Chromebook-Specific Web Policy
      • Prerequisites
      • Procedure
    • Chromebook Client - FAQs
    • Google Workspace Identity Service FAQs
  • Hardware Integration
    • Integration for ISR 4K and ISR 1100 – Security Configuration Guide
      • Create a Legacy Network Devices API Token
    • Wireless LAN Controller Integration
      • Prerequisites
      • Terminology
      • Wireless LAN Controller Setup and DNS Request Flow
      • Configure the Wireless LAN Controller Integration
      • Sample Wireless LAN Controller Deployments
        • Scenario 1: Configure Local Policies for Cisco Umbrella
          • Setup
        • Scenario 2: Configure WLAN or AP Group for Cisco Umbrella
          • Setup
        • OpenDNS WLAN configuration modes
      • Cisco Umbrella Activity Reporting
      • Cisco Umbrella Support
      • Cisco Umbrella Limitations
    • Meraki Cloud-Managed Networks and Umbrella DNS
      • Integrate Meraki with Cisco Umbrella
      • Configure Meraki to Use Cisco Umbrella
    • Mobility Express Integration
      • Prerequisites
      • Deploy the Integration
    • Cisco SD-WAN Powered by Catalyst SD-WAN and Umbrella
      • Prerequisites
      • Limitations
      • Configure Umbrella and Cisco Catalyst SD-WAN
        • Authorization: Cisco Catalyst SD-WAN (vManage) Version 19.2/IOS-XE 16.12 and Earlier
        • Authorization: vManage Version 20.1 and Later
        • Insert Authorization Data
    • Integration for RV-series Routers
      • Prerequisites
      • Integration
      • Limitations and Restrictions of the Cisco Umbrella Integration
    • Cisco Catalyst 9200 and Catalyst 9300 Switches
      • Prerequisites
        • For Active Directory integration on the Catalyst 9200 and 9300 switch:
    • Cisco DNA Center
    • Cisco Secure Firewall
      • Prerequisites
      • Limitations
      • Configure the Umbrella Connection
      • Create and Manage Umbrella DNS Policies
  • Cisco Adaptive Security Appliances (ASA)
    • Integration for ASA Overview
      • Prerequisites
        • Licensing
        • Hardware and Software
        • Network Access
    • Import the Digicert Certificate Authority
      • Prerequisites
      • Procedure
    • Configure the Umbrella Connector
      • Prerequisites
      • Obtain Your API Token
      • Configure Umbrella Global Settings
      • Enable Umbrella in the DNS Inspection Policy
    • Monitor the Umbrella Connector
      • Monitor Umbrella Syslog Messages
    • Delete an ASA
      • Prerequisites
      • Delete the Umbrella Configuration
      • Remove the ASA From the Dashboard
        • Ensure that the ASA is Removed
  • Investigate
    • Manage Umbrella Investigate
      • Getting Started with Investigate
      • Conduct a Pattern Search
      • Manage the Investigate Only User Role
      • About Passive DNS
      • About Investigate View Types
      • Create Investigate API Keys
      • About the Investigate Domain Summary
        • About Investigate Passive DNS Timeline
          • DNS Query Volume
          • Event History
        • Dispute a Content Categorization
          • Submit Categorization Request Through Cisco Talos
          • Submit Categorization Request Through Investigate
        • About DNS Resolution in Investigate
          • IP Addresses
          • Nameserver (NS)
          • DNS (Others)
        • About Associated Samples in Investigate
        • About the Subdomains Tab in Investigate
        • About Related Domains in Investigate
        • About the Geographic Distribution View in Investigate
        • About the Sample View in Investigate
          • Prerequisites
          • Get Started With Sample View
          • Sample View Details
            • Components of a Threat Sample
          • Behavioral Indicators
          • Network Connections
          • Associated Samples
          • Associated Artifacts (Secure Malware Analytics Integration)
        • About the IP Address View in Investigate
          • Summary
          • DNS Resolution
          • Autonomous Systems
          • Associated Samples
          • Recent Detections
      • About WHOIS Record Information
        • About the WHOIS Nameserver View
        • WHOIS Data – FAQ
      • About the ASN View
        • Prerequisites
        • Current Information
        • Current Routes
        • Research AS From IP Address View

Umbrella Roaming Security: Cisco Secure Client Umbrella Roaming Security: Cisco Secure Client (formerly AnyConnect) Deploy Umbrella module in Cisco Secure Client Mass Deployment (macOS)

Last updated: Dec 07, 2025

Previous topic Optional OrgInfo.json Parameter Configurations Next topic Contents
© 2025 Cisco System, Inc.
Privacy policyTerms of Service