<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE: how to use/analyze monitoring backups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100070#M147040</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I am aware only TAC can analyze the contents.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Nov 2012 22:18:13 GMT</pubDate>
    <dc:creator>martyn.rees</dc:creator>
    <dc:date>2012-11-20T22:18:13Z</dc:date>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100069#M147037</link>
      <description>&lt;P&gt;Is there a tool or any instructions on how to view/analyze the data contained in the scheduled monitoring Backups? (filename.tar.gpg), &lt;/P&gt;&lt;P&gt;I have tryed to decrypt it with gpg4win but the operation result is an empty folder...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100069#M147037</guid>
      <dc:creator>Giuliano Gerardi</dc:creator>
      <dc:date>2019-03-11T02:48:09Z</dc:date>
    </item>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100070#M147040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I am aware only TAC can analyze the contents.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 22:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100070#M147040</guid>
      <dc:creator>martyn.rees</dc:creator>
      <dc:date>2012-11-20T22:18:13Z</dc:date>
    </item>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100071#M147043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class="active_link"&gt;Giuliano&lt;/SPAN&gt;, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ISE collects log and configuration data from&amp;nbsp; across the network. It then aggregates the data into reports for you to&amp;nbsp; view and analyze.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ISE provides a standard set of predefined reports that you can use and customize to fit your needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_report.html"&gt;http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_report.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 05:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100071#M147043</guid>
      <dc:creator>Anas Naqvi</dc:creator>
      <dc:date>2013-09-24T05:45:06Z</dc:date>
    </item>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100072#M147047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to have authorized access privaleges to review that as per my understanding.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 18:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100072#M147047</guid>
      <dc:creator>sahseth</dc:creator>
      <dc:date>2013-10-03T18:36:20Z</dc:date>
    </item>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100073#M147049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Giuliano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Monitoring backups that were taken from the Active MNT node can be viewed or analyzed only by restoring them back in the Active MNT node. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the list of MNT backups that you can restore them under the Primary Adminsitration node section Administration - System - Maintanence - Data Management - Monitoring Node - Data Restore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally what happens is as the monitoring data grows we are purging the older monitored data. So If we wnat to view any older monitored data then we have to restore the MNT backups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you decrypt the backup file using gpg decrypt tool , you cannot read the data from backup file directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Naresh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Oct 2013 07:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100073#M147049</guid>
      <dc:creator>Naresh Ginjupalli</dc:creator>
      <dc:date>2013-10-05T07:43:18Z</dc:date>
    </item>
    <item>
      <title>ISE: how to use/analyze monitoring backups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100074#M147052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are the types of back up that are possible in the ISE device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information&amp;nbsp; please go to the link pasted below.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wpxref35325"&gt;http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wpxref35325&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_ui_reference_administration.html#wpxref58256"&gt;On-Demand Backup Settings&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_man_admin.html#wpxref59194"&gt;Cisco ISE Admin Groups, Access Levels, Permissions, and Restrictions&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wp1133236"&gt;Backup and Restore Repositories&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wp1115450"&gt;Scheduling a Backup&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wp1123770"&gt;Performing a Backup from the CLI&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wp1116429"&gt;Backup History&lt;/A&gt; &lt;/P&gt;&lt;P&gt;•&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.2/user_guide/ise_backup.html#wp1133787"&gt;Backup Failures&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 00:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-use-analyze-monitoring-backups/m-p/2100074#M147052</guid>
      <dc:creator>blenka</dc:creator>
      <dc:date>2013-10-09T00:13:53Z</dc:date>
    </item>
  </channel>
</rss>

