<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Exclude endpoints statically assigned to identity groups from purging in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/exclude-endpoints-statically-assigned-to-identity-groups-from/m-p/3852755#M473254</link>
    <description>&lt;P&gt;I'm looking for some guidance and ideas here.&amp;nbsp; I'm looking at a deployment with close to 5 million total endpoints and it's going to surpass that shortly.&amp;nbsp; I want to build out some endpoint purge policies, and the concept is simple enough, but I'm facing a bit of a pickle.&lt;/P&gt;
&lt;P&gt;I can't see a way to dynamically exclude endpoints that are statically assigned to identity groups.&amp;nbsp; I can add every identity group used for statically assigning endpoints, but if someone creates a new one, it's likely they will forget that there is a purge policy that will catch it.&amp;nbsp; Is there any option to build a purge exclusion expression to catch statically assigned endpoints?&amp;nbsp;Additionally, is there any way we can exclude endpoints that have a description entered?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was thinking of appending a common identifier to all the identity groups used for static assignment and modifying all the mab policies.&amp;nbsp; It still doesn't fix other admins mistakenly creating identity groups without this tag, but at least I could create a single exclusion rule based on "contains xxxx".&lt;/P&gt;
&lt;P&gt;Any alternatives?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 May 2019 23:21:50 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-05-08T23:21:50Z</dc:date>
    <item>
      <title>Exclude endpoints statically assigned to identity groups from purging</title>
      <link>https://community.cisco.com/t5/network-access-control/exclude-endpoints-statically-assigned-to-identity-groups-from/m-p/3852755#M473254</link>
      <description>&lt;P&gt;I'm looking for some guidance and ideas here.&amp;nbsp; I'm looking at a deployment with close to 5 million total endpoints and it's going to surpass that shortly.&amp;nbsp; I want to build out some endpoint purge policies, and the concept is simple enough, but I'm facing a bit of a pickle.&lt;/P&gt;
&lt;P&gt;I can't see a way to dynamically exclude endpoints that are statically assigned to identity groups.&amp;nbsp; I can add every identity group used for statically assigning endpoints, but if someone creates a new one, it's likely they will forget that there is a purge policy that will catch it.&amp;nbsp; Is there any option to build a purge exclusion expression to catch statically assigned endpoints?&amp;nbsp;Additionally, is there any way we can exclude endpoints that have a description entered?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was thinking of appending a common identifier to all the identity groups used for static assignment and modifying all the mab policies.&amp;nbsp; It still doesn't fix other admins mistakenly creating identity groups without this tag, but at least I could create a single exclusion rule based on "contains xxxx".&lt;/P&gt;
&lt;P&gt;Any alternatives?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 23:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/exclude-endpoints-statically-assigned-to-identity-groups-from/m-p/3852755#M473254</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-05-08T23:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude endpoints statically assigned to identity groups from purging</title>
      <link>https://community.cisco.com/t5/network-access-control/exclude-endpoints-statically-assigned-to-identity-groups-from/m-p/3852813#M473255</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Not sure it will help but I got kind of same request which I wasn’t able to manage directly from ISE purge feature.&lt;BR /&gt;Instead we went with another approach by using APIs. You’ll be able to see if the device is statically assigned, if it has a specific description and based on your get endpoint, you’ll be able to delete all that don’t matter for you.&lt;BR /&gt;</description>
      <pubDate>Thu, 09 May 2019 02:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/exclude-endpoints-statically-assigned-to-identity-groups-from/m-p/3852813#M473255</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-05-09T02:18:01Z</dc:date>
    </item>
  </channel>
</rss>

