<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect ISE posture with SBL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502243#M518519</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, the states/ levels of trust could be a good idea. The new laptops must have machine cert and have a posture module installed as part of the build so if the user is uknown it can only mean that the system scan did not run initially, most likely because of the SBL.&lt;BR /&gt;We could try to restrict it futher but creating an AD group for the "new laptop users" so that only these users can can have a less restrictive dACL with uknown posture, if necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would prevent a user from moving the machine cert to a diffrent non-corp laptop and trying to log in from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Jan 2018 21:28:36 GMT</pubDate>
    <dc:creator>rkazmierczak</dc:creator>
    <dc:date>2018-01-19T21:28:36Z</dc:date>
    <item>
      <title>AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502237#M518506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman',serif;"&gt;Hello!&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman',serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman',serif;"&gt;Will AnyConnect ISE posture work with SBL, i.e will posture check work before the user has logged on? If not, what alternatives would be available? &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 17:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502237#M518506</guid>
      <dc:creator>rkazmierczak</dc:creator>
      <dc:date>2018-01-19T17:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502238#M518508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Posture check works after user logon to device, we allow for user to log on then CoA based on posture assessment&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 17:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502238#M518508</guid>
      <dc:creator>raufm</dc:creator>
      <dc:date>2018-01-19T17:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502239#M518511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No it requires the user space&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is your problem use case?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 18:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502239#M518511</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-19T18:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502240#M518513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in this case, the main (actually the only) reason to use SBL is to allow users to log on to the domain first time from a new laptop, without the cached credentials. the customer also uses folder redirection which must work during this first logon. But because the system scan does not run, the posture is uknown and they get restrictive ACL, which prevents folder redirection from working. We can't make the Non-compliant/uknown dACL more permissive to allow foder redirection as that would mean allowing access to file servers (where the folders reside). Ideally, we would check for things like registry kyes, files, AV, disc encryption before giving them more permissive dACL. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 20:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502240#M518513</guid>
      <dc:creator>rkazmierczak</dc:creator>
      <dc:date>2018-01-19T20:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502241#M518515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You also have to take into consideration of Mobile work force's password expiration if it applies, so SBL comes in handy without requiring them to come into the office to change the password or by some other means. However you also have to allow certain access for Drive mapping / gpo ( as was in our case ) or it takes forever for all the polices to fail before user gets authenticated and then re-exec of gpo.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 20:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502241#M518515</guid>
      <dc:creator>raufm</dc:creator>
      <dc:date>2018-01-19T20:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502242#M518517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK understood. Unfortunately not possible since we only run in user space and that’s where all of the other systems run as well I believe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can ask for an enhancement by reaching out to our product managers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could have machine auth have some basic sort of trust, this would help some?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;State 1 Machine auth + unknown&lt;/P&gt;&lt;P&gt;State 2 user auth + unknown&lt;/P&gt;&lt;P&gt;State 3 user auth + non-compliant (most restrictive?)&lt;/P&gt;&lt;P&gt;State 4 user auth + compliant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 20:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502242#M518517</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-19T20:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502243#M518519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, the states/ levels of trust could be a good idea. The new laptops must have machine cert and have a posture module installed as part of the build so if the user is uknown it can only mean that the system scan did not run initially, most likely because of the SBL.&lt;BR /&gt;We could try to restrict it futher but creating an AD group for the "new laptop users" so that only these users can can have a less restrictive dACL with uknown posture, if necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would prevent a user from moving the machine cert to a diffrent non-corp laptop and trying to log in from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 21:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502243#M518519</guid>
      <dc:creator>rkazmierczak</dc:creator>
      <dc:date>2018-01-19T21:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502244#M518520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds good to me. I think if you have the problem of a user moving a certificate you have other issues to be concerned with &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 21:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502244#M518520</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-19T21:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect ISE posture with SBL</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502245#M518521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is a "high security" environment so they will be considering this, that's why they needed to check for other things like registry keys and disc encryption.&lt;/P&gt;&lt;P&gt;But thanks for your help. Much appreciated. I'll let you know if the security guys accepted this solution &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 21:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-with-sbl/m-p/3502245#M518521</guid>
      <dc:creator>rkazmierczak</dc:creator>
      <dc:date>2018-01-19T21:39:44Z</dc:date>
    </item>
  </channel>
</rss>

