Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Cisco Secure Access DNS Defense Help

  • Cisco Secure Access - DNS Defense Help
    • Welcome to Cisco Secure Access – DNS Defense
      • Sign into Secure Access – DNS Defense with Security Cloud Sign On
        • Prerequisites
        • Procedure
      • Find Your Organization ID
        • Prerequisites
        • Procedure
      • Determine Your Current Package
      • View Cloud Security Service Status
        • Cloud Security Service Status
          • Cisco Secure Access Services
          • Secure Access Service Status
        • Past Incidents
      • Contact Cisco Secure Access Support
    • Secure Access Single Sign-On Authentication
      • Configure Single Sign-On Authentication
        • Prerequisites
          • Add Your Organization's Identity Provider in Security Cloud Sign On
          • Add Administrators to Secure Access
        • Procedure
      • Troubleshoot Single Sign On Authentication
    • Get Started
      • Begin Secure Access Onboarding Workflow
      • Step 1 – Configure Network Connections
        • Prerequisites
        • Task 1 – Add Network Connections
          • Add Network Tunnel Groups
          • Add Resource Connectors and Connector Groups
        • Task 2 – Provision Users and Groups
        • Task 3 – Configure Integrations with SAML Identity Providers
        • What's Next
      • Step 2 – Configure Access to Resources
        • Prerequisites
        • Task 1 – Set Up Private Resources
        • Task 2 – Configure Rule Defaults and Global Settings
          • Manage Rule Defaults
          • Manage Global Settings
        • Task 3 – Add a Policy Rule
        • What's Next
      • Step 3 - Configure End User Connectivity
        • Prerequisites
        • Task 1 – Configure Zero Trust
        • Task 2 – Configure Virtual Private Networks
        • Task 3 – Configure Internet Security
        • Task 4 - Configure Endpoints and Networks
      • Step 4 – Configure Endpoints and Network Sources
        • Prerequisites
        • Add Networks to Secure Access
        • Set Up the Cisco Secure Client
        • Add IPS Profiles
        • Configure Rule Profiles
      • Secure Access Overview Dashboard
        • Prerequisites
        • Get Started Workflow
        • Connectivity
        • Data Transfer
        • Security
          • Security Activity
          • Top Security Categories
        • Users and Groups
        • Private Resources
    • Limitations and Range Limits
      • Internet Protocol Versions
      • Secure Access Components
      • Identity Integrations
      • Users and Roles
      • Reporting
      • Data Retention
      • Monthly DNS Query Average
    • Network Requirements for Secure Access
      • Secure Access DNS Resolvers
        • Best Practices
        • Cisco Secure Client
        • Cisco Secure Client and External DNS Resolution
      • Secure Access Encrypted DNS Queries
      • Secure Access DNS, Web, and Block Pages
      • Secure Access DNS and Web – Client Configuration Services
        • Windows Only
      • Secure Access DNS and Web – Client Sync Services
      • Secure Access DNS and Web – Client Certificate Revocation Services
      • Cisco Secure Client and Captive Portal Detection
      • Cisco Secure Client and Device Hostnames
      • Transport Layer Security Protocol Requirements
        • TLS 1.2 Support in Windows
        • TLS 1.2 Support in macOS
      • Secure Access Secure Web Gateway Services
        • Egress IP Addresses for the Secure Web Gateway
        • Ingress IP Addresses for the Secure Web Gateway
      • Secure Access Encrypted Web Requests
      • Secure Access Realtime DLP Secure ICAP
      • Secure Access SaaS Tenants
        • Microsoft 365
      • Secure Access SAML Gateway Services
        • Active Directory Federation Service SAML Identity Provider
      • Secure Access SAML Identity Provider Domains
        • Azure AD SAML Identity Provider
      • Secure Access SAML Gateway Client Certificate Revocation Services
      • Secure Access VPN Services
      • Secure Access VPN Client Certificate Revocation Services
      • Secure Access Zero Trust Client-Based Enrollment Services
      • Secure Access Zero Trust Client-Based Proxy Services
        • Known Network Restrictions for Zero Trust Clients
      • Secure Access Zero Trust Client-Based Proxy – Client Certificate Revocation Services
      • Secure Access Zero Trust Proxy Services – Unmanaged Devices
      • Secure Access Zero Trust Services and Connector Groups
    • Manage Network Connections
      • Comparison of Network Connection Methods
        • Resource Connectors (Deployed in Connector Groups)
        • Network Tunnels (Deployed in Network Tunnel Groups)
    • Manage Network Tunnel Groups
      • Device Compatibility and Network Tunnels
        • IPsec Tunnel Requirements
        • Supported Devices for Setting Up IPsec Tunnels
      • Add a Network Tunnel Group
        • Prerequisites
        • Procedure
          • Configure Tunnel on Network Device
          • Verify Tunnel Traffic in Secure Access
      • Delete a Network Tunnel Group
        • Prerequisites
        • Procedure
      • Edit a Network Tunnel Group
        • Prerequisites
        • Procedure
      • View Network Tunnel Group Details
        • Prerequisites
        • Procedure
        • Network Tunnel Overview
          • List Tunnel Status
      • Supported IPsec Parameters
    • Network Tunnel Configuration
      • Establish a Tunnel
        • Maximum Transmission Unit (MTU) Size
        • Tunnel Size
        • Client Reachable Prefixes
        • Throughput and Multiple Tunnels
    • Manage Resource Connectors and Connector Groups
      • Overview: Setting Up Resource Connectors and Connector Groups
    • Manage Users and Groups
      • Import Users and Groups from CSV File
        • Prerequisites
          • CSV File Format
          • CSV File Fields
        • Procedure
        • View Provisioned Users and Groups in Secure Access
      • Provision Token for Identity Provider
        • Prerequisites
        • Procedure
        • Configure Identity Providers
      • Provision Users and Groups from Okta
        • Prerequisites
        • Limitations
        • Supported Features
        • Import the ObjectGUID Attribute from Okta to Secure Access
        • Configure the Cisco Secure Access App
          • Step 1 – Add the App to Okta
          • Step 2 – Add the Secure Access SCIM Token to the App
          • Step 3 – Configure the Required User Options
          • Step 4 – (Optional) Add a New Attribute and Create the User Profile Mapping
          • Step 5 – Assign Users and Groups in the App
          • Step 6 – View Logs in the App
        • View Provisioned Users and Groups in Secure Access
        • Refresh SCIM Token
      • Provision Users and Groups from Azure AD
        • Prerequisites
        • Limitations
        • Procedure
        • Configure the Cisco User Management for Secure Access App
        • View Users and Groups Provisioned from Azure
        • Refresh the SCIM Token
      • Provision Users and Groups from Google Workspace
      • View User Details
        • Prerequisites
        • Procedure
        • User Details
          • General User Details
          • Device Connectivity
          • Groups and Events
          • Associated Rules
      • View Group Details
        • Prerequisites
        • Procedure
        • Group Details
          • General Group Details
          • Users and Events
          • Associated Rules
      • View Endpoint Device Details
        • Prerequisites
        • Procedure
      • Unenroll Devices for Client-Based Zero Trust Access
        • Reenroll the User Device on the Secure Client
        • Prerequisites
        • Procedure
      • Disconnect Remote Access VPN Sessions
        • Prerequisites
        • Procedure
      • Provision Users, Groups and Endpoint Devices from Active Directory
        • Prerequisites for AD Connectors
          • Connector Server
          • Outbound Network Access to Secure Access
          • Connector Account
        • Connect Active Directory to Secure Access
          • Prerequisites
            • Connector Server
            • Outbound Network Access to Cisco Secure Access
            • Connector Account
          • Step 1 – Choose a Provisioning Method
          • Step 2 – Register a Domain Controller or Domain in Secure Access
            • Register a Domain Controller
            • Register a Domain
          • Step 3 – Install the Secure Access AD Connector
          • Step 4 – Configure Updates on Deployed AD Connectors
          • Step 5 – Verify that the Connector Syncs with Secure Access
          • Specify AD Groups of Interest
            • Supported Organizational Units
            • Unsupported Organizational Units
            • Sample File Entries
            • Total Number of Groups Selected for Synchronization
        • Connect Multiple Active Directory Domains
        • Change the Connector Account Password
          • Prerequisites
            • Connector Server
            • Outbound Network Access to Cisco Secure Access
            • Connector Account
          • Procedure
        • AD Connector Communication Flow and Troubleshooting
          • Communication Flow
          • Troubleshooting
            • Firewall or Access Control Requirements
        • View AD Components in Secure Access
          • Prerequisites
          • Procedure
            • View AD Components in Secure Access
    • Configure Integrations with SAML Identity Providers
      • Use Cases
        • Secure Internet Access—Networks and Network Tunnels
        • Zero Trust Access with the Cisco Secure Client
        • Zero Trust Access with an Unmanaged Device
      • Configure Identity Providers for SAML Authentication
    • Manage End-User Connectivity
      • DNS Servers
      • Traffic Steering for Cisco Secure Client Connections
      • Virtual Private Networks Settings and Profiles
      • Internet Security
    • Manage DNS Servers
      • Prerequisites
      • About DNS Server Configuration
      • Add a DNS Server
      • View DNS Servers
      • Edit a DNS Server
      • Delete a DNS Server
    • Traffic Steering for Zero Trust Access Client-Based Connections
      • Best Practices
    • Manage Virtual Private Networks
      • FQDNs for Network Connections
        • About Fully Qualified Domain Names (FQDNs)
        • Secure Access Global FQDN
        • Secure Access Regional FQDNs
        • Secure Access VPN FQDNs
      • Manage IP Pools
      • Add an IP Pool
        • Prerequisites
        • Procedure
          • Add an IP Pool
          • Add a RADIUS Group (optional)
      • Manage VPN Profiles
      • Add VPN Profiles
        • Prerequisites
        • Step 1 – General Settings
        • Step 2 – Authentication, Authorization, and Accounting
          • SAML
          • SAML Configuration
          • SAML Metadata XML Configuration
          • Manual Configuration
          • RADIUS
          • Certificate
        • Step 3 – Traffic Steering (Split Tunnel)
        • Step 4 – Cisco Secure Client Configuration
      • Add a RADIUS Group
        • Prerequisites
        • Procedure
    • Manage Internet Security
      • Download Cisco Secure Client or Roaming Client
      • Add Bypass Domains and Set Up Internet Security
      • Next Steps
    • Manage Domains
      • Add Internal Domains
        • Prerequisites
        • Procedure
    • Internal Networks Setup Guide
      • Provision a Subnet for Your Virtual Appliance
        • Prerequisites
        • Procedure
      • Manage Sites
        • Prerequisites
        • Before You Begin
        • Procedure
      • Manage Internal Networks
        • Prerequisites
        • Before You Begin
        • Procedure
        • Apply DNS Policies to Internal Network
      • Assign a Policy to Your Site
    • Manage a Network Device
      • Prerequisites
      • Procedure
        • Step 1: Create a Network Devices API Key
        • Step 2: Register a Network Device
        • Step 3: Add Network Device to a DNS Policy
        • Step 4: Test Your Network Device Integration
    • Manage Registered Networks
      • Add Network Resources
        • Prerequisites
          • Dynamic IP Address—IPv4 Only
        • Procedure
          • Step 1 – Select the Network
          • Step 2 – Configure the Network Resource
          • Step 3 – Change the DNS Settings on Your Relevant Network Device
          • Step 4 – Apply a Policy Rule to the Network Resource
          • Step 5 – Test Your Network
      • Point Your DNS to Cisco Secure Access
        • Cisco Secure Access DNS Resolvers – IP addresses
        • Cisco Secure Access DNS Resolvers – Anycast IP Addresses
        • Prerequisites
        • Procedure
          • Step 1 – Identify Where Your Public DNS Server Addresses are Configured
          • Step 2 – Log Into the Server or Router Where DNS is Configured
          • Step 3 – Change Your DNS Server Addresses
            • Primary and Secondary Servers
          • Step 4 – Test Your New DNS Settings
      • Clear Your DNS Cache
        • Prerequisites
        • Clear Your DNS Cache on Computers and Servers
          • Windows 7 and Earlier
          • Windows 8 and Newer
          • OS X 10.4 TIGER
          • OS X 10.5 and 10.6 LEOPARD
          • OS X 10.7 and 10.8 Lion
          • OS X 10.9 and 10.10
          • Linux
          • Ubuntu Linux
        • Clear Your DNS Cache on Browsers
          • Internet Explorer 8 and Newer – Windows
          • Mozilla Firefox – Windows
          • Apple Safari – macOS
          • Apple Safari – macOS
          • Google Chrome – Windows
          • Google Chrome – macOS
      • Update a Network Resource
        • Prerequisites
        • Edit the Registered Network Resource Name
        • Update the Registered Network Resource
      • Delete a Network Resource
        • Prerequisites
        • Procedure
    • Manage Roaming Devices
      • View Internet Security Settings for Roaming Devices
        • Prerequisites
        • Procedure
          • Host Information
      • Edit Internet Security Settings for Roaming Devices
        • Prerequisites
        • Procedure
          • Edit the Auto-Delete Interval for Roaming Devices
      • Delete a Roaming Device
        • Prerequisites
        • Procedure
    • Manage Destination Lists
      • Best Practices
      • How to Format Your Destination List
      • Add a Destination List
        • Prerequisites
        • Procedure
      • Edit a Destination List
        • Prerequisites
        • Procedure
      • Add Destinations in Bulk
        • Prerequisites
        • Procedure
      • Download Destinations to a CSV File
        • Prerequisites
        • Procedure
      • Control Access to Custom URLs
        • Prerequisites
          • Enable the Intelligent Proxy
          • Install a Root Certificate
        • Block a URL
          • URL Normalization
          • URL Normalization for Destination Lists
          • Troubleshooting Unblocked URLs
          • Reporting for Blocked URLs
        • Examples
        • Contact Support
      • Wildcards and Destination Lists
      • Add Punycode Domain Name to Destination List
        • What is Punycode?
        • Examples of Unicode and Punycode Encoded Strings
      • Test Your Destinations (Hidden in SSE/SSE DNS)
      • Search for a Destination List
      • Troubleshoot Destination Lists
        • Destination Lists and Common Error Conditions
    • Manage Internet and SaaS Resources
    • Manage Application Lists
      • Add an Application List
        • Prerequisites
        • Procedure
      • Application Categories
        • Category Descriptions
      • Delete an Application List
        • Prerequisites
        • Procedure
    • Manage Content Category Lists
      • Available Content Categories
      • Add a Content Category List
        • Prerequisites
        • Procedure
      • Request a Category for an Uncategorized Destination
        • Prerequisites
        • Procedure
      • Dispute a Content Category
        • Prerequisites
        • Submit Categorization Request Through Cisco Talos
        • Submit Categorization Request Through Umbrella
      • View Content Categories in Reports
        • Prerequisites
        • View Content Categories in Activity Search Report
        • View Content Categories in Top Threats Report
        • View Content Categories in Total Requests Report
        • View Content Categories in Activity Volume Report
        • View Content Categories in Top Destinations Report
        • View Content Categories in Top Categories Report
    • Manage Private Resources
      • Step 1 – Configure Private Resources
        • Optional Configuration for Private Resources
      • Step 2 — Set Up Network Connections, VPN Profiles, and Certificates
      • Step 3 — Add Private Resources in Private Access Rules
      • Step 4 — Set Up the Cisco Secure Client and Distribute URLs
    • Manage AAA Servers
    • Manage Connections to Private Destinations
      • Comparison of Zero Trust Access and VPN
      • Comparison of Client-Based and Browser-Based Zero Trust Access Connections
        • Client-based connections:
        • Browser-based connections:
      • Requirements for Zero Trust Access
        • Resource requirements for client-based zero trust access
        • Resource requirements for browser-based zero trust access
        • Network Requirements for Zero Trust Access
      • Network Authentication for Zero Trust Access
      • Manage Branch Connections
        • Endpoint Connection Methods
        • Branch Networks in Private Access Rules
          • Users and Groups Connections to Private Resources
          • Sources for Branch Network Connections
          • Destinations for Branch Network Connections
          • Source Connections to Destinations
        • Add an IPS Profile on Private Access Rules
        • Log Connections From Branch Networks to Private Resources
    • Manage the Access Policy
      • About the Access Policy
        • Best Practices
        • Default Rule Data
      • Show Additional Data on Your Access Rules
        • Prerequisites
        • Procedure
      • Edit the Order of the Rules in Your Access Policy
      • Rule Defaults: Default Settings for Access Rules
        • Zero Trust Access: Endpoint Posture Profiles
        • Zero Trust Access: User Authentication Interval
        • Intrusion Prevention (IPS)
      • Global Settings for Access Rules
        • Global Settings for Access Rules
        • Decryption Logging
      • Edit Rule Defaults and Global Settings
        • Prerequisites
        • Procedure
      • Edit the Default Access Rule
        • Default Internet Access Rule
        • Default Private Access Rule
        • To View or Edit Default Access Rules
    • Get Started With Private Access Rules
      • Components for Private Access Rules
        • Sources
        • Destinations
          • Private Resources
          • Private Resource Groups
        • Endpoint Posture Profiles (for Endpoint Requirements)
        • Security Controls
      • Default Settings for Private Access Rules
      • Add a Private Access Rule
        • Prerequisites
        • Set Up the Private Access Rule
          • Enable the Rule and Edit Your Logging Settings
          • Add a Rule Name
          • Choose a Rule Order
        • Step 1 — Specify Access Options
          • Rule Action
          • Sources
          • Destinations
          • Endpoint Requirements
          • User Authentication Requirements
        • Step 2 — Configure Security Control Options
          • Intrusion Prevention (IPS)
        • Summary
      • About Configuring Sources in Private Access Rules
        • Source Components for Private Access Rules
        • Composite Sources for Private Access Rules
          • Limitations of Composite Sources
          • IP Addresses, CIDR Blocks, and Wildcard Masks
          • Add Composite Sources
          • Combining IPs, CIDRs, or Wildcard Masks on a Source
        • Use Wildcard Masks in Composite Sources
          • Guidelines
          • Examples of Wildcard Masks
        • Combining Multiple Sources in a Rule (Boolean logic)
      • About Configuring Destinations in Private Access Rules
        • Destination components for Private Access Rules
        • Composite Destinations for Private Access Rules
          • IP Addresses, CIDR Blocks, and Wildcard Masks
          • Ports
          • Protocols
          • Add Composite Destinations
          • Combining Destination Components as a Single Destination
        • Use Wildcard Masks in Composite Destinations
          • Guidelines
          • Examples of Wildcard Masks
        • Combining Multiple Destinations in a Rule (Boolean Logic)
      • About Endpoint Requirements in Access Rules
      • Allowing Traffic from Users and Devices on the Network
      • Global Settings for Private Access Rules
      • View Rules Associated with a Private Resource
      • Troubleshoot Private Access Rules
        • General Troubleshooting Tips
        • Problems While Creating a Rule
          • Next button is not available
        • Problems After Creating a Rule
          • Traffic is unexpectedly blocked
          • Traffic is unexpectedly allowed
          • Rule does not match traffic as expected
    • Get Started With Internet Access Policy
      • Components for Internet Access Rules
        • Sources
        • Destinations
        • Security Controls
          • Security Profile
            • Configure Threat Category Settings
            • Set Up Certificates for Decrypting Internet Traffic
            • Configure Do Not Decrypt Lists
            • (Optional) Configure Custom End-User Block and Warn Notifications
            • Configure Security Profiles for Internet Access
      • Default Settings for Internet Access Rules
      • Add an Internet Access Rule
        • Prerequisites
        • Procedure
        • Access Options
          • Disable or Enable the rule
          • Logging settings
          • Summary
          • Rule name
          • Rule order
          • Rule action
          • Pre-Configured Sources
          • Composite Sources
          • Pre-Configured Destinations
          • Composite Destinations
          • App Risk Profile
          • Advanced Application Controls
        • Security Control Options
          • Security Profile
        • Next Steps
      • About Configuring Sources in Internet Access Rules
        • Source Components for Internet Access Rules
        • Composite Sources for Internet Access Rules
          • Limitations of Composite Sources in Internet Rules
          • IP Addresses, CIDR Blocks, and Wildcard Masks
          • Adding Composite Sources
          • Combining IPs, CIDRs, or Wildcard Masks on a Source
        • Combining Multiple Sources in a Rule (Boolean logic)
      • About Configuring Destinations in Internet Access Rules
        • Destination Components for Internet Access Rules
        • Pre-Configured Destinations on an Internet Rule
        • Application Lists and Application Categories on an Internet Rule
        • Application Protocols on an Internet Rule
          • How Application Protocols Combine with Composite Destinations
        • Composite Destinations for Internet Access Rules
          • Limitations of Composite Destinations
          • IP Addresses, CIDR Blocks, and Wildcard Masks
          • Ports
          • Adding Composite Destinations
          • Combining Destination Components as a Single Destination
        • Combining Multiple Destinations in a Rule (Boolean Logic)
        • Number of Destinations in a Rule
      • Ensure Rule Matching for Encrypted Internet Traffic
      • Block Internet Access to Geographic Locations
      • Advanced Application Controls
        • Applications with Advanced Controls
          • Cloud Storage
          • Collaboration
          • Content Management
          • Media
          • Office Productivity
          • P2P
          • Social Networking
        • Prerequisites
        • Procedure
        • Troubleshooting
      • Global Settings for Internet Access Rules
      • About Isolated Destinations
        • Prerequisites
          • Secure Access Prerequisites
          • Browser Prerequisites
        • Secure Access Package Support for RBI and Isolation Rules
          • Isolate Any
          • Isolate Risky
        • Verifying Isolation
        • Limitations of Isolation
      • Troubleshoot Internet Access Rules
        • General troubleshooting tips
        • Problems while creating the rule
          • The Next button is unavailable
        • Problems after creating a rule
          • Internet traffic is unexpectedly blocked
          • Internet traffic is unexpectedly allowed
          • Internet Access rule is not matching traffic as expected
      • Zero Trust Access to Internet Destinations
        • Solution Overview
    • Manage File Inspection for Internet Policy
      • How File Inspection Works
        • How is a File Inspected?
          • Cisco Advanced Malware Protection (AMP) Scanning
          • Antivirus Scanning
    • Manage File Inspection and File Analysis for Private Access Rules
      • Overview of Configuring File Inspection and Analysis
      • File Inspection Details
        • Cisco Advanced Malware Protection (AMP)
        • Antivirus Scanner
      • Cisco Secure Malware Analytics (formerly Threat Grid) Details
        • Supported Files and File Limitations
        • Secure Malware Analytics Sandbox
    • Manage File Type Controls
    • Manage the Intelligent Proxy
      • How the Intelligent Proxy Works
      • Advantages of Using the Intelligent Proxy
      • Sites That are Not Proxied by the Intelligent Proxy
      • Best Practices
      • SSL Decryption Requirements and Implementation
      • Do Not Decrypt Lists
    • Manage Endpoint Security
      • About Endpoint Posture
      • About Posture Profiles
      • Endpoint Posture Assessment
    • Manage Zero Trust Access Posture Profiles
      • Zero Trust Access Posture Attributes
    • Manage VPN Connection Posture Profiles
      • VPN Posture Attributes
    • Manage IPS Profiles for Private Access
      • How IPS Works
        • Hit Counts
        • Cisco-Provided IPS Signature Lists
      • Decryption is Required for Effective Intrusion Prevention
    • Manage Security Profiles
      • Security Profiles for Internet Access
        • Functionality Included in a Security Profile for Internet Access
        • Decryption
        • SSO Authentication
          • Requirements for Enabling OIDC Authentication
          • Requirements for Enabling SAML Authentication
          • Requirements for Disabling SAML Authentication
        • Security and Acceptable Use Controls
        • End-User Notifications
        • Get Started: Security Profiles for Internet Access
      • Add a Security Profile for Internet Access
        • Prerequisites
        • Procedure
        • Add a Security Profile
        • Security and Acceptable Use Controls
          • Threat Categories
          • File Inspection
          • SafeSearch
          • Intelligent Proxy
        • Configure End-User Notifications
        • View Security Profiles
        • Configure Additional Security Options
        • Add a Security Profile on Internet Access Rules
        • Edit a Security Profile
        • Delete a Security Profile
      • Enable SafeSearch
        • Enable SafeSearch
        • Confirm That SafeSearch is Working
          • Google
          • YouTube
          • Yahoo
          • Bing
      • Security Profiles for Private Access
      • Add a Security Profile for Private Access
        • Prerequisites
        • Procedure
        • Next steps
    • Manage Threat Categories
      • Threat Category Descriptions
      • Add a Threat Category List
        • Prerequisites
        • Procedure
      • Dispute a Threat Categorization
        • Prerequisites
        • Procedure
      • Threat Intelligence Feeds
      • Add Threat Intelligence Feeds
        • Prerequisites
        • Additional Prerequisites for Cisco AMP Threat Grid
        • Enable Third-Party Platform Feeds
        • Add a Threat Intelligence Feed
        • Add Threat Intelligence Feeds to Internet Access Rule
          • List the Blocked Domains
        • Logging and Reports
          • View Reports
          • View Admin Audit Log
          • Access Logs in S3
      • Custom Feed Best Practices
        • Known Domains and Destination Lists
        • Delete a Domain from Custom Destination Block List
    • Manage Notification Pages
      • View Notification Pages Displayed to End Users
      • Display Custom Notification Pages to End Users
      • About Block Pages for Private Access Traffic
    • Manage Traffic Decryption
      • Internet Access Features Requiring Decryption
      • Internet Traffic That Should Not Be Decrypted
      • Decryption in Private Access Rules
      • Decryption Settings
      • Decryption Requires Certificates
      • Decryption Logging
      • Troubleshooting Decryption
    • Manage Certificates
      • Certificate Installation Methods
      • Manage the Cisco Umbrella Root Certificate
        • Why Install a Certificate?
      • Manage the Secure Access Root Certificate
        • Certificate Installation Methods
      • View the Cisco Trusted Root Store
        • Prerequisites
          • Download the Cisco Trusted Union Root Bundle
        • Extract the Certificates
          • Step 1: Extract the Signing Certificate
          • Step 2: Extract Certificate Bundle as Message
          • Step 3: Extract PEM-Formatted Certificates From Bundle
          • Step 4: Generate Individual Certificate Files
            • Linux
            • macOS
        • View an Individual Certificate File
      • Certificates for Internet Decryption
        • Certificates for Displaying Notifications
        • Certificates for Decrypting Internet Traffic
          • Option 1: Distribute Self-Signed Certificates to End-User Devices
          • Option 2: Use a Signed Certificate for Decrypting Internet Traffic
      • Manage Certificates for Private Resource Decryption
        • Prerequisites
          • Install a Certificate Authority Certificate on a Private Resource
        • Procedure
          • View Notifications About Expired Private Resource Certificates
          • Upload Private Resource Certificates
            • Option 1: Upload or enter a certificate-key pair directly to the private resource
            • Option 2: Upload a certificate and key to the Certificates page
      • Certificates for Private Resource Decryption
      • Certificates for SAML Authentication
      • Manage SAML Certificates for Service Providers
        • Prerequisites
        • Procedure
          • View Notifications About Expired Service Provider Certificates
          • Download Zero Trust Service Provider Certificates
          • Download Virtual Private Network Service Provider Certificates
      • Manage SAML VPN Service Provider Certificate Rotation
        • Prerequisites
        • Procedure
          • View Notifications About Expired Service Provider Certificates
          • Activate a New VPN Service Provider Certificate
      • Manage SAML Certificates for Identity Providers
        • Prerequisites
        • Procedure
          • View Notifications About Expired Identity Provider Certificates
          • Manage Zero Trust Identity Provider Certificates
          • Manage Virtual Private Network Identity Provider Certificates
      • VPN Certificates for User and Device Authentication
      • Push the Cisco Root Certificate to Managed Devices
        • Prerequisites
        • Procedure
    • Manage Accounts
      • Add a New Account
        • Prerequisites
        • Procedure
      • Edit Account Settings
        • Prerequisites
        • Procedure
      • Delete an Account
      • Hide Identities with De-identification
        • Prerequisites
        • Identity Types
        • Enable De-identification
        • Disable De-identification
        • Limitations
    • Manage SaaS API Data Loss Prevention
      • Enable SaaS API Data Loss Prevention
        • Prerequisites
        • Procedure
      • Revoke SaaS API Data Loss Prevention for a Platform
        • Prerequisites
        • Procedure
      • Enable SaaS API Data Loss Prevention for Google Drive Tenants
        • Prerequisites
        • Validation
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Webex Teams Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Microsoft 365 Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Dropbox Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Box Tenants
        • Prerequisites
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Slack Tenants
        • Prerequisites
        • Limitations
        • Authorize a Tenant
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for ServiceNow Tenants
        • Prerequisites
        • Limitation
        • Find the Instance Name for your ServiceNow admin Account
        • Assign the oauth_user role to the ServiceNow admin Account
        • Add an OAuth Client to Your ServiceNow Deployment
        • Authorize a Tenant
        • Revoke Authorization
        • View the Cisco Quarantine Table in Service Now
      • Enable SaaS API Data Loss Prevention for AWS Tenants
        • Prerequisites
        • Limitation
        • Enable CloudTrail Event Logging for S3 Buckets and Objects
        • Obtain Your AWS Account ID
        • Authorize an AWS Tenant
        • Create an AWS Stack
        • Revoke Authorization
      • Enable SaaS API Data Loss Prevention for Azure Tenants
        • Prerequisites
        • Limitation
        • Authorize an Azure Tenant
        • Run an Azure PowerShell Script to Obtain Account Information
        • Revoke Authorization
    • Manage Cloud Malware Protection
      • Cloud Access Security Broker Protection for Google Drive and Microsoft 365
    • Manage API Keys
      • Add Secure Access API Keys
        • Prerequisites
        • Add API Key
        • Refresh API Key
        • Update API Key
        • Delete API Key
      • Add KeyAdmin API Keys
        • Use Cases
        • Prerequisites
        • Add KeyAdmin API Key
        • Refresh KeyAdmin API Key
        • Update KeyAdmin API Key
        • Delete KeyAdmin API Key
    • Log Management
      • Where are Logs Stored?
        • Logging to the Secure Access Data Warehouse
        • Logging to Amazon S3
        • Advantages and Disadvantages of Configuring a Cisco-Managed Bucket
  • Reports
    • Monitor Secure Access with Reports
      • Export Report Data to CSV
      • Bookmark and Share Reports
        • Prerequisites
        • Procedure
      • Report Retention
      • Report Scheduling
      • Schedule a Report
        • Prerequisites
        • Procedure
          • Check Your Spam Folder
          • Unsubscribe From a Scheduled Report
      • Update a Scheduled Report
        • Prerequisites
        • Procedure
    • Remote Access Log Report
      • View the Remote Access Log Report
        • Prerequisites
        • Procedure
        • View the Remote Access Log Report
        • View Details
    • Activity Search Report
      • View and Customize the Activity Search Report
        • Prerequisites
        • View the Activity Search Report
        • Customize the Activity Search Report
        • Save Activity Search Report columns and filters for future use
        • Customize and Manage Saved Searches
      • View Zero Trust Events in Activity Search Report
        • Prerequisites
        • Procedure
          • Access Details
          • Block Details
          • Endpoint Details
      • View Activity Search Report Actions
        • Prerequisites
        • See Full Details
        • Filter Views
      • Schedule an Activity Search Report
      • Use Search and Advanced Search
        • Prerequisites
        • Search
        • Wildcards
          • Domains
          • URLs
          • File Names
        • Advanced Search
    • Security Activity Report
      • View Activity and Details by Filters
        • Prerequisites
        • Procedure
      • View Activity and Details by Event Type or Security Category
        • Prerequisites
        • Procedure
          • Group Security Categories
      • View an Event's Details
        • Prerequisites
        • Procedure
      • Search for Security Activity
        • Prerequisites
        • Procedure
          • Advanced Search
    • Total Requests Report
      • Prerequisites
      • Procedure
    • Activity Volume Report
      • Prerequisites
      • View Requests by Activity Volume
      • View Activity Volume by Threat Category
        • Prevent
        • Contain
      • View Activity Volume by Policy Traffic
      • View Trends Over Time
    • App Discovery Report
      • Prerequisites
      • Procedure
    • Top Destinations Report
      • Prerequisites
      • View the Top Destinations Report
      • View Further Details
    • Top Categories Report
      • Prerequisites
      • View the Top Categories Report
        • Sort by Traffic
        • Ascending or Descending Order
      • Top Categories Quick View
      • View Category in Other Reports
    • Third-Party Apps Report
      • Prerequisites
      • View the Third-Party Apps Report
      • Search the Third-Party Apps Report
      • Export the Third-Party Apps Report
    • Cloud Malware Report
      • Prerequisites
      • View the Cloud Malware Report
      • Use the Cloud Malware Report
        • Quarantine a Malicious File
        • Delete a Malicious File
        • Dismiss an Item from the Report
        • Export the Report
    • Admin Audit Log Report
      • Prerequisites
      • Generate Admin Audit Log Report
    • Top Threats Report
      • View the Threats Report
      • View Top Threat Types
      • View How Threats Impact Your Environment
      • Search for Threats in Activity Search
      • Threat Type Details
        • Prerequisites
        • View a Threat's Details
        • View a Threat Type's Requests
        • View the Threat Type's Impact on Your Environment
        • View More Details in Activity Search
      • Threat Type Definitions
    • Top Identities Report
      • Prerequisites
      • View the Top Identities Report
      • View Identity in Other Reports
  • DNS Forwarders
    • Virtual Appliance Introduction
      • How Secure Access Virtual Appliances Work
      • Benefits of Virtual Appliances
      • Prerequisites
        • Virtual Appliance Requirements
          • VMware Requirements
          • Microsoft Hyper-V Requirements
          • Cloud Platform Requirements
          • KVM Requirements
          • Nutanix Requirements
        • Networking Requirements
          • SSH Support Tunnel
          • Networking: Additional Considerations
        • DNSCrypt
      • Deployment Guidelines
        • Virtual Appliance Deployment Best Practices
          • Redundancy
          • Multiple DNS Egresses
          • Single DNS Egress
          • Double NAT
      • Importance of Running Two VAs
        • Benefits of Two VAs
    • Deploy Virtual Appliances
      • Deploy VAs in Hyper-V for Windows 2012 or Higher
        • Procedural Overview
        • 1. Download the Hyper-V Installer
          • 2. Import the Virtual Appliance
          • 3. Copy and Rename Image Files
          • 4. Select Network Adapter
          • 5. Select Hard Drive
          • 6. Power on the Virtual Machine
          • 7. Repeat for the Second Virtual Appliance
      • Deploy VAs in VMware
        • Procedural Overview
        • 1. Download OVF Template
          • 2. Deploy OVF Template
          • 3. Deploy a Second Virtual Appliance
          • 4. Power on the Virtual Machines
      • Deploy VAs in Microsoft Azure
        • Prerequisites
        • Before You Begin
        • Procedure
        • Step 1: Prepare the Virtual Appliance Image on Azure
          • Step 2: Launch the Virtual Appliance on Azure
      • Deploy VAs in Amazon Web Services
        • Prerequisites
        • Procedural Overview
        • 1. Prepare the Virtual Appliance Amazon Machine Image
          • 2. Launch the Virtual Appliance on Amazon Web Services
      • Deploy VAs in Google Cloud Platform
        • Prerequisites
        • Procedural Overview
        • Prepare the Virtual Appliance Instance Template on GCP
          • Launch the Virtual Appliance on Google Cloud Platform
      • Deploy VAs in KVM
        • Prerequisites
        • Procedural Overview
        • 1. Create the qcow2 files for KVM
          • 2. Launch the Virtual Appliance on KVM
      • Deploy VAs in Nutanix
        • Prerequisites
        • Procedure
    • Configure Virtual Appliances
      • Prerequisites
      • Enter Configuration Mode on a VA Deployed on VMware, Hyper-V, or KVM
      • Enter Configuration Mode on a VA Deployed in Azure, AWS, or Google Cloud Platform
      • Configure the VA Through Configuration Mode
      • Add a Second VA
    • Local DNS Forwarding
      • Manage Domains in the VA
        • What format does the internal domains list accept?
        • Which domains should be added?
        • (Optional) Add A & PTR Records for the VAs
      • Configure Local DNS Servers on the VA
        • Examples
    • Reroute DNS
      • Test VAs
      • Test with Endpoints
      • Transition Production Traffic
    • Update Virtual Appliances
      • Update Your Virtual Appliance
      • Configure Automatic Update of Virtual Appliances
      • Manual Update of a Virtual Appliance
      • Configure Automatic Update Postponement
    • Virtual Appliance Sizing Guide
      • Network Prerequisites
      • What is a Virtual Appliance?
      • Connector Sizing Guidelines
      • Deployment Considerations
        • Overall Latency
        • Number of Secure Access Sites
        • Number of Users per VA
    • SNMP Monitoring
      • Enable SNMP Monitoring
        • SNMPv2.x
        • SNMPv3
        • Privacy Password
        • Configure SNMP in Secure Access Virtual Appliance
        • SNMP Command Syntax
      • About SNMP Monitoring
      • Standard OIDs Supported by the Virtual Appliance
      • Extended OIDs Supported by the Virtual Appliance
    • Troubleshoot Virtual Appliances
      • Reset a Virtual Appliance's Password
      • Use Configuration Mode to Troubleshoot
      • Establish a Support Tunnel From the VA
      • Troubleshoot Intermittent DNS Resolution Failures on a VA Deployed in Azure
      • Troubleshoot DNS Resolution in Configuration Mode
      • Troubleshoot DNS Resolution Failures Behind a Firewall
      • Troubleshoot Egress Network Connectivity From VA
    • Other Configurations
      • Configure Rate Limiting
      • Configure NTP Servers
        • Configure DNS Resolvers
        • Configure DNSSEC Support
        • Configure Logging to Remote Syslog Server
          • Turn Off the Logging
          • Configure Dual-NIC Support on the VA
            • Configure an Existing VA to Support Dual-NIC
            • Deploy a New VA to Support Dual-NIC DMZ Mode
          • Configure Anycast
            • Configure Anycast over BGP on the VA
            • Configure Load Balancing
            • Configure Identity Association Timeouts
    • Active Directory Integration with the Virtual Appliances
      • Network Diagram for VA Deployments
  • Managed iOS Device
    • Cisco Security Connector—Secure Access Setup Guide
      • Requirements
        • Optionally
      • Getting Started
    • Meraki Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Push of Profile Config
        • Anonymize Your Device
        • Verify Secure Access on Your Device
    • Verify Secure Access with Meraki
      • Prerequisites
      • Procedure
        • Verify Local Operation on the iOS Device
        • Verify Secure Access
        • Verify Clarity
        • Upgrade the Cisco Security Connector
        • Uninstall the Cisco Security Connector
    • Meraki Documentation
    • Apple Configurator 2 Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Secure Access on Your Device
    • IBM MaaS360 Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Secure Access on Your iOS Device
    • Intune Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Secure Access on Your iOS Device
    • Jamf Registration
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
        • Alternate Configuration
        • Anonymization
      • Verify Secure Access on Your iOS Device
      • Install Root Certificate
    • MobiConnect Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Secure Access on Your iOS device
    • MobileIron Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify Secure Access on Your iOS device
      • Install Umbrella Root Certificate
    • Workspace ONE Registration
      • Anonymization
      • Prerequisites
      • Procedure
        • Verify Secure Access on Your iOS Device
    • Register an iOS Device Through a Generic MDM System
      • Anonymization
      • Prerequisites
      • Procedure
        • Step 1: Add an Organization Administrator's Email Address
        • Step 2: Add a Mobile Device
      • Verify That Your Device is Protected by Secure Access
      • Install Root Certificate
    • Apply Secure Access Policies to Your Mobile Device
      • Prerequisites
      • Procedure
    • Anonymize Devices
      • Prerequisites
      • Procedure
    • Add User Identity for Cisco Security Connector
      • Prerequisites
      • Procedure
      • Test Integration of User Identity With Cisco Security Connector
    • Troubleshooting
      • Prerequisites
      • Generate Diagnostics and Email the Secure Access Reports
      • Generate Diagnostics and Share the Secure Access Reports
    • Configure Cellular and Wifi Domains
      • Prerequisites
      • Procedure
  • Managed Android Device
    • Cisco Secure Client (Android OS)
      • Device Security
      • Prerequisites
      • Known Issues
    • Deploy the Android Client
      • Download Configuration
      • MDM Configurations
      • Umbrella Certificate
    • Manage Identities
      • Cisco Meraki Systems Manager
      • Microsoft Intune
      • Samsung Knox
      • VMWare WorkspaceOne
      • Access the User Identities on the Secure Access Dashboard
        • Configure Policy Based on User Identity
        • Monitor User Activity
    • Troubleshooting
      • Is this a VPN to Secure Access?
      • An Internal Site Isn't Loading
      • Configuration Issues
      • Check for VPN Connection and Policy
      • Check Block Page
      • Get the Android ID
      • Fail Close/Open Scenario
      • Check Device Registration
      • Missing CA Certificate
      • Org ID on Policy Page is 0
      • App Installation is Blocked
      • Offboarding Users
      • Known Issues
    • Frequently Asked Questions
  • Unmanaged Mobile Device Protection
    • Secure Access Unmanaged Mobile Device Protection
    • Administrator Actions
      • Prerequisites
      • Procedure
    • End-User Actions
      • Android
        • Known Limitations
        • Prerequisites
        • Deployment
        • Enrollment
        • Enrollment by QR code
        • Enrollment without Camera Access
        • Registration and Activation
      • iOS
        • Known Limitations
        • Prerequisites
        • Deployment
        • Enrollment by Link
        • Enrollment by QR code
        • Registration and Activation
  • Cisco Secure Client
    • Cisco Secure Client Overview
    • Get Started and Manage Client-based Zero Trust Access from Mobile Devices
      • Set up the Zero Trust Access App for iOS Devices
        • System Requirements
        • Guidelines and Limitations
        • Configure Settings in Cisco Secure Access
        • Install the App
        • Have End Users Enroll in Zero Trust Access
        • Notes for administrators
      • Set up the Zero Trust Access App for Android on Samsung Devices
        • Requirements and Prerequisites
        • Configure Cisco Secure Access
        • Install the App
        • (Optional) Set up the Android device for Zero Trust Access using MDM
          • Add the app to MDM
          • Set up the App on the Samsung Device
        • Enroll the Device in Zero Trust Access
        • Notes for administrators
      • Monitor and Troubleshoot the Zero Trust Access App from Mobile Devices
        • Monitor Activity
        • General Troubleshooting
        • Troubleshoot iOS Devices
        • Troubleshoot Samsung Devices Running Android OS
        • Troubleshoot access issues
    • Get Started with Cisco Secure Client on Windows and macOS Devices
      • Prerequisites
        • Secure Access Requirements
          • Download the Cisco Secure Client Pre-Deployment Package
        • Install Cisco Secure Client
      • Download Cisco Secure Client
        • Step 1 - Navigate to the Download Cisco Secure Client window
        • Step 2 - Download Cisco Secure Client
          • Download the latest version of Secure Client from Secure Access
          • Download the cloud-managed version of Secure Client
          • Download a previous version of Secure Client from Cisco Secure Central
        • Step 3 - Download configuration files
        • Step 4 - Install Secure Client
          • ThousandEyes Endpoint Agent Module
      • Download the OrgInfo.json File
        • Prerequisites
        • Procedure
          • Step 1 – Download the OrgInfo.json File
          • Step 2 – Copy the OrgInfo.json File to the Target Directory
      • Manual Installation of Cisco Secure Client (Windows and macOS)
      • Mass Deployment Overview
      • Contents
      • Remote Installation
        • Profile Installation
        • Customization Options
      • Mass Deployment (Windows)
      • Contents
        • (Optional) Package Customization
          • Add Umbrella Profile
        • Automated Installation (Windows)
          • Install Cisco Secure Client
          • Install the Umbrella Profile
          • (Optional) Disable VPN Functionality (Post installation)
      • Customize Windows Installation of Cisco Secure Client
        • Requirements
        • Prerequisites
        • Procedure
          • Deploy the Cisco Secure Client VPN Module
          • Deploy the Cisco Secure Client Umbrella Roaming Security Module
          • (Optional) Deploy the Cisco Secure Client DART Module
          • Hide Cisco Secure Client from Add/Remove Programs List
        • Optional OrgInfo.json Configurations
      • Mass Deployment (macOS)
      • Contents
        • (Optional) Package Customization
          • Add Umbrella Profile
          • (Optional) Disable VPN Functionality
          • Save the .dmg image
        • Automated Installation (macOS)
          • Installation (Pre-Deployment Package)
          • Installation (Web Deployment Package)
          • Install Umbrella Profile
          • (Optional) Disable VPN Functionality (Post-Installation)
          • Allow Secure Client System Extensions
      • Customize macOS Installation of Cisco Secure Client
        • Requirements
        • Prerequisites
        • Procedure
        • Step 1 – Make the DMG Package Writeable
        • Step 2 – Generate the Module Installation Configuration File
          • Step 3 – Copy OrgInfo.json to Cisco Secure Client Installation Directory
          • Step 4 – (Optional) Hide the VPN Module
            • Step 5 – Customize the Cisco Secure Client Installation Modules
              • Example – Customize Cisco Secure Client Modules
            • Step 6 – Set Up the Correct Extension Permission Settings
            • Step 7 – Install Cisco Secure Client with Selected Modules
      • VPN Headend Deployment
      • Meraki Systems Manager (SM) Deployment
      • Migration from Umbrella Roaming Client
      • Install the Root Certificate for All Browsers
        • Inspect and Decrypt HTTPS Traffic
        • Render Notification Pages
      • Cloud Management
      • Contents
      • Overview
      • Deploying Cisco Secure Client
      • Profiles
      • Uploading the Orginfo.json profile
      • Create a Deployment
      • Post Deployment
        • Additional Reference
      • Additional References
      • Remote Monitoring and Management Deployment Tutorials
    • Manage Internet Security on Cisco Secure Client
      • Umbrella Roaming Security Module Requirements
        • System Requirements
        • Network Requirements
          • Secure Access DNS Block Pages
          • Secure Access and SAML Identity Provider Domains
        • Transport Layer Security Protocol
        • Network Access
          • Host Names
          • Secure Access DNS Resolvers
          • Encrypted DNS
          • External DNS Resolution
          • HTTP and HTTPS
          • Secure Access DNS – Client Configuration Services
          • Secure Access DNS – Client Sync Services
          • Secure Access DNS and Web – Client Certificate Revocation Services
        • Roaming Security DNS Requirements
        • Internal Domains
      • Domain Management
        • Internal Domains List
        • DNS Suffixes
        • Operational Flow
          • Configure Internal Domains
          • Cisco Secure Client and External Queries
          • Cisco Secure Client and Internal Queries
        • Advanced Topics
          • Unencrypted
          • DNS Suffixes (Continued)
      • Interpret Internet Security Diagnostics
        • Prerequisites
        • Procedure
          • Generate the Diagnostic Report from the Cisco Secure Client
          • Generate the Diagnostic Report on the Command Line
      • IPv4 and IPv6 DNS Protection Status
        • Prerequisites
        • Procedure
        • DNS and IP Layer State Descriptions
    • Manage Zero Trust Access on Cisco Secure Client
      • Invite Users to Enroll in Zero Trust Access for Secure Client
        • Prerequisites
        • Recommended: Use MFA Authentication and Biometric Identity
        • Procedure
      • Requirements for Secure Client with Zero Trust Access
      • Troubleshoot Client-Based Zero Trust Access
        • Pre-Enrollment Errors
        • Enrollment Errors
        • Post-Enrollment Errors
        • Requests to Reauthenticate
      • Unenroll a Device from Zero Trust Access
    • Manage Virtual Private Networks on Cisco Secure Client
      • Prerequisites
  • Cisco Security for Chromebook Client
    • About Cisco Security for Chromebooks
      • Key benefits
    • Prerequisites for Cisco Security for Chromebooks Client
    • Limitations for Cisco Security for Chromebooks
    • Integrate the Google Workspace Identity Service
      • Limitations
      • Prerequisites
      • Procedure
    • Deploy the Cisco Security for Chromebooks Client
      • About DNS-Layer Protection
      • High-Level Steps for Deploying Cisco Security for Chromebook Client
        • Step 1. In Secure Access:
        • Step 2. In the Google Admin console
      • Procedure
        • Step 1
        • Step 2
    • View Protection Status of Chromebook Devices
      • Procedure
    • Add Policies to a Chromebook Device
      • Prerequisites
      • Procedure
    • Cisco Security for Chromebooks Client FAQ
    • Google Workspace Identity Service FAQ

Cisco Secure Access - DNS Defense Help Manage Users and Groups Provision Users, Groups and Endpoint Devices from Active Directory Change the Connector Account Password Prerequisites Outbound Network Access to Cisco Secure Access

Last updated: Dec 02, 2025

Previous topic Connector Server Next topic Connector Account
© 2025 Cisco System, Inc.
Privacy policyTerms of Service