<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE/SecurityCenter Integration Credentialed Scans in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4185858#M5851</link>
    <description>&lt;P&gt;I had the same issue when attempting to test ISE TC-NAC integration with Security Center.&amp;nbsp; Note that at the time we were running ISE 2.4p9.&amp;nbsp; We were advised this is a Security Center side of the house issue.&amp;nbsp; Unfortunately, this is due primarily to Security Center config and the need to run on-demand scans constantly.&amp;nbsp; AFAIK the only option is to look into testing/using nessus clients on all your workstations due to the lack of ability to configure Windows creds in the scan policy.&amp;nbsp; My recommendation would be to look into other options, test/research the local nessus clients (as I think this eliminates the need for credentials from what I remember), and open a ticket/talk to someone on the Nessus side.&amp;nbsp; Lastly, be aware that the local nessus clients eat resources pretty badly.&amp;nbsp; HTH &amp;amp; Good luck!&lt;/P&gt;</description>
    <pubDate>Thu, 19 Nov 2020 13:43:57 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2020-11-19T13:43:57Z</dc:date>
    <item>
      <title>Cisco ISE/SecurityCenter Integration Credentialed Scans</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4184070#M5833</link>
      <description>&lt;DIV class="cuf-body cuf-questionTitle forceChatterFeedBodyQuestionWithoutAnswer"&gt;&lt;SPAN class="uiOutputText"&gt;Cisco ISE/SecurityCenter Integration Credentialed Scans&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="cuf-body cuf-questionBody forceChatterFeedBodyQuestionWithoutAnswer"&gt;&lt;DIV class="cuf-feedBodyText forceChatterMessageSegments forceChatterFeedBodyText"&gt;&lt;DIV class="feedBodyInner Desktop"&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;We have followed this guide and gotten automated scanning of systems to work:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A title="https://community.cisco.com/t5/security-documents/cisco-tc-nac-with-ise-and-tenable-security-center/ta-p/3647543" href="https://community.cisco.com/t5/security-documents/cisco-tc-nac-with-ise-and-tenable-security-center/ta-p/3647543" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="uiOutputText"&gt;https://community.cisco.com/t5/security-documents/cisco-tc-nac-with-ise-and-tenable-security-center/ta-p/3647543&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Now the only issue is getting credentialed scans on systems.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Using this guide:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A title="https://community.tenable.com/s/article/Scanning-with-non-default-Windows-Administrator-Account" href="https://community.tenable.com/s/article/Scanning-with-non-default-Windows-Administrator-Account" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="uiOutputText"&gt;https://community.tenable.com/s/article/Scanning-with-non-default-Windows-Administrator-Account&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I have worked with our system administrators, network administrators and our HBSS administrator to configure a test laptop with these settings, and we are still not getting credentialed scans.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Now, when setting up the Scan Policy on SecurityCenter, there is no Windows credential option under the Authentication tab. However, if I log into the Nessus scanner directly, this is not the case. I have the option there to create and include Windows credentials ad infinitum within scan policies I build there.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Is there a reason SecurityCenter scan policy creation does NOT have the Windows credential authentication option available? if this were fixed, this would be the path of least resistance instead of trying to push a GPO that disables login requirements for secured laptops, disabling HBSS and opening up ports locally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 15 Nov 2020 11:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4184070#M5833</guid>
      <dc:creator>Elbeshti1</dc:creator>
      <dc:date>2020-11-15T11:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE/SecurityCenter Integration Credentialed Scans</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4185858#M5851</link>
      <description>&lt;P&gt;I had the same issue when attempting to test ISE TC-NAC integration with Security Center.&amp;nbsp; Note that at the time we were running ISE 2.4p9.&amp;nbsp; We were advised this is a Security Center side of the house issue.&amp;nbsp; Unfortunately, this is due primarily to Security Center config and the need to run on-demand scans constantly.&amp;nbsp; AFAIK the only option is to look into testing/using nessus clients on all your workstations due to the lack of ability to configure Windows creds in the scan policy.&amp;nbsp; My recommendation would be to look into other options, test/research the local nessus clients (as I think this eliminates the need for credentials from what I remember), and open a ticket/talk to someone on the Nessus side.&amp;nbsp; Lastly, be aware that the local nessus clients eat resources pretty badly.&amp;nbsp; HTH &amp;amp; Good luck!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 13:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4185858#M5851</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-11-19T13:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE/SecurityCenter Integration Credentialed Scans</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4409454#M6147</link>
      <description>&lt;P&gt;A workaround if someone else needs this. We are running an integration between Tenable.sc (v5.18.0) and Cisco ISE initiating scans automatically. Additionally we have CyberArk running to pull credentials for various (credentialed) scans. I did encounter the same problem as the Windows credentials are configured for the active scan and not in the "scan policy" used by ISE.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What I did was to look into the Sqlite database on our Tenable.sc server. Then I found the credentials ID ("credID" column) and automatically associated all new on-demand scans with those credentials. This is done with a simple SQL trigger, so every time a new scan is added, a new row with automatically be added to ensure it will run credentialed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CredID is the first one we added "1000001". You can identify yours with the following command&lt;/P&gt;&lt;P&gt;#sqlite&amp;gt; select * from Credential;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CREATE TRIGGER add_cyberark_win_creds_to_ise_scans&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;AFTER INSERT ON ScanAsset&lt;/P&gt;&lt;P&gt;BEGIN&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;INSERT INTO ScanCredential (scanID,credID) VALUES (new.scanID,1000001);&lt;/P&gt;&lt;P&gt;END;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can modify the trigger to match only the API user used by ISE or other stuff to tweak it.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 12:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4409454#M6147</guid>
      <dc:creator>ttronier</dc:creator>
      <dc:date>2021-05-27T12:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE/SecurityCenter Integration Credentialed Scans</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4442026#M6280</link>
      <description>&lt;P&gt;Very Helpful i will test it and get back to you, many thanks&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 18:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-ise-securitycenter-integration-credentialed-scans/m-p/4442026#M6280</guid>
      <dc:creator>Elbeshti1</dc:creator>
      <dc:date>2021-07-30T18:43:01Z</dc:date>
    </item>
  </channel>
</rss>

