<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Attributes for anomalous behaviour in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4030073#M454312</link>
    <description>&lt;P&gt;The majority of false positives with anomalous behavior are due to ISE not taking into account applications that use DHCP Discover messages.&amp;nbsp; For example, an enterprise organization using Skype will see a lot of false positives because Skype will send DHCP Discover messages with the class identifier of "MS-UC-Client" to try to discover SIP servers.&amp;nbsp; This is normal behavior per the DHCP RFC.&amp;nbsp; Some other applications do the same to discover things like proxy configuration files.&amp;nbsp; There is already a bug filed for this issue but I am not sure when it will be addressed.&lt;/P&gt;&lt;P&gt;This issue is keeping a lot of customers from using anomalous behavior.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Feb 2020 20:58:12 GMT</pubDate>
    <dc:creator>Colby LeMaire</dc:creator>
    <dc:date>2020-02-14T20:58:12Z</dc:date>
    <item>
      <title>Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4018694#M454298</link>
      <description>&lt;P&gt;One of my client requested for implementing anomalous behavior on Endpoints, however I have gone through Cisco documentation on this but still have unclear explanation.&lt;/P&gt;&lt;P&gt;The default condition on&amp;nbsp; ISE for anomalous behavior states:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Endpoints:AnomalousBehaviourEQUALStrue AND Device:LocationEQUALSAllLocations&lt;/P&gt;&lt;P&gt;Is there any other attributes that can be added to enforce anomalous behavior based on the the three major attributes provided so has not to deny legitimate endpoints or user access on the network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAS-Port-Type&amp;nbsp;&lt;/P&gt;&lt;P&gt;DHCP Class ID&amp;nbsp;&lt;/P&gt;&lt;P&gt;Endpoint Policy&lt;/P&gt;&lt;P&gt;Also I have about more than 500 endpoints on the network that anomalous behaviour = true, How do I narrow down to endpoints that are malicious or illegitimate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 11:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4018694#M454298</guid>
      <dc:creator>Mannyteck</dc:creator>
      <dc:date>2020-01-27T11:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4019112#M454302</link>
      <description>&lt;P&gt;As per the document you attached (&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" target="_blank" rel="noopener"&gt;Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2&lt;/A&gt;), there are specific behaviours that the Anomalous Endpoint Detection feature looks for:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAS-Port-Type&lt;/STRONG&gt; - Determines if the access method of this endpoint has changed. For example, if the same MAC address that connected via Wired Dot1x is used for Wireless Dot1x and visa-versa.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;DHCP Class ID&lt;/STRONG&gt; - Determines whether the type of client/vendor of endpoint has changed. This only applies when DHCP class ID attribute is populated with a certain value and is then changed to another value. &lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Endpoint Policy&lt;/STRONG&gt; - A change in endpoint profile from Printer or IP phone to Workstation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While this might work for some strict customer environments, I found it to be prone to a large number of false positives in at least one large enterprise customer production environment. As such, they did not have the appetite to enable any policies that would enforce network restrictions based on the 'AnomalousBehaviour = True' attribute flag.&lt;/P&gt;
&lt;P&gt;They were not interested in investigating further, but I suspect a factor might be a large number of endpoints having Virtual Machine guests that use a NAT mode to share the same MAC address as the host.&lt;/P&gt;
&lt;P&gt;You would likely need to isolate one of the PCs with the 'AnomalousBehaviour = True' attribute and start doing packet captures to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 22:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4019112#M454302</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-01-27T22:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4021766#M454304</link>
      <description>&lt;P&gt;I have also asked the SME&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/68046"&gt;@kthiruve&lt;/a&gt;&amp;nbsp;to take a look. This is likely an enhancement for the future as well&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;To contact our product team for future enhancement requests, externally for cisco customers/partners at &lt;A href="http://cs.co/ise-feedback" target="_blank"&gt;&lt;SPAN class="s1"&gt;http://cs.co/ise-feedback&lt;/SPAN&gt;&lt;/A&gt; for cisco employees internally at &lt;A href="http://cs.co/ise-pm" target="_blank"&gt;&lt;SPAN class="s1"&gt;http://cs.co/ise-pm&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2020 16:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4021766#M454304</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2020-01-31T16:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4030055#M454306</link>
      <description>&lt;P&gt;Thank you for the pointers. I will bring this up with the PM/Engineering team.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In ISE profiler settings, there are two settings. Anomalous behavior detection and enforcement.&lt;/P&gt;
&lt;P&gt;Start with detection and understand the false postives and investigate the reasons before turning on the enforcement and adding it to authz.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE determines the behavior based on what it receives from the endpoint. For endpoint policy, it will detect significant change such as workstation to printer and highlight that as anomalous behavior. It will not detect that change from Cisco IP Phone to IP Phone xxx model as anomalous.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Krishnan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 20:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4030055#M454306</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2020-02-14T20:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4030073#M454312</link>
      <description>&lt;P&gt;The majority of false positives with anomalous behavior are due to ISE not taking into account applications that use DHCP Discover messages.&amp;nbsp; For example, an enterprise organization using Skype will see a lot of false positives because Skype will send DHCP Discover messages with the class identifier of "MS-UC-Client" to try to discover SIP servers.&amp;nbsp; This is normal behavior per the DHCP RFC.&amp;nbsp; Some other applications do the same to discover things like proxy configuration files.&amp;nbsp; There is already a bug filed for this issue but I am not sure when it will be addressed.&lt;/P&gt;&lt;P&gt;This issue is keeping a lot of customers from using anomalous behavior.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 20:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4030073#M454312</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-02-14T20:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4771463#M579726</link>
      <description>&lt;P&gt;Hi Greg, I have a question:&lt;/P&gt;&lt;P&gt;We have a situation where a legit account username is being used by an unauthorized person who is entering continuously a wrong password and therefore locking out that legit account. Blocking the MAC is not possible due to the randomized MAC address added by Android and Apple to their software so I was wondering if Anomalous Behaviour could help but I do not see it. Still trying to find out the user but not possible yet. thanks in advance for any suggestion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 16:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4771463#M579726</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-08T16:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Attributes for anomalous behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4771648#M579733</link>
      <description>&lt;P&gt;I don't see how the Anomalous Behavior feature in ISE would help here. The feature is all related to attributes of the endpoints and has no visibility of the user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 21:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/attributes-for-anomalous-behaviour/m-p/4771648#M579733</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-08T21:19:26Z</dc:date>
    </item>
  </channel>
</rss>

