<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 2.3 Anomalous Endpoint Detection in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478853#M520572</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Referring to an older discussion: &lt;A href="https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834" title="https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834"&gt;https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It's mentioned that detection will work based on dhcp class id change and endpoint ID group change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a customer facing document mentioning 4 parameters:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-Configure-Anomalous-Endpoint-Detection-a.html" style="font-size: 10pt;" title="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-Configure-Anomalous-Endpoint-Detection-a.html"&gt;Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The information is a little conflicting and I just wanted clarification on what conditions will anomalous endpoint detection trigger?&amp;nbsp; We know that detection based on dhcp-class-id works.&amp;nbsp; If the other parameters mentioned are incorrect or not considered for detection, i will get the external document edited to reflect the current status of the feature: &lt;/P&gt;&lt;OL style="margin-top: 10px; margin-bottom: 10px; margin-left: 15px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; list-style-position: inside; list-style-image: initial; color: #58585b;"&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;NAS-Port-Type&lt;/SPAN&gt; - Determines if the access method of this endpoint has changed. For example, if the same MAC address that connected via Wired Dot1x has been used for Wireless Dot1x and visa-versa.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;DHCP Class ID&lt;/SPAN&gt; - Determines whether the type of client/vendor of endpoint has changed.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;Operating System - &lt;/SPAN&gt;Significant OS changes such as Windows to Apple iOS.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;Endpoint Policy - &lt;/SPAN&gt;Significant profile changes. For example, a change from Phone or Printer to PC.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Oct 2017 19:53:16 GMT</pubDate>
    <dc:creator>Devrat Kamath</dc:creator>
    <dc:date>2017-10-23T19:53:16Z</dc:date>
    <item>
      <title>ISE 2.3 Anomalous Endpoint Detection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478853#M520572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Referring to an older discussion: &lt;A href="https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834" title="https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834"&gt;https://cisco.jiveon.com/message/415834?commentID=415834#comment-415834&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It's mentioned that detection will work based on dhcp class id change and endpoint ID group change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a customer facing document mentioning 4 parameters:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-Configure-Anomalous-Endpoint-Detection-a.html" style="font-size: 10pt;" title="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-Configure-Anomalous-Endpoint-Detection-a.html"&gt;Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The information is a little conflicting and I just wanted clarification on what conditions will anomalous endpoint detection trigger?&amp;nbsp; We know that detection based on dhcp-class-id works.&amp;nbsp; If the other parameters mentioned are incorrect or not considered for detection, i will get the external document edited to reflect the current status of the feature: &lt;/P&gt;&lt;OL style="margin-top: 10px; margin-bottom: 10px; margin-left: 15px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; list-style-position: inside; list-style-image: initial; color: #58585b;"&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;NAS-Port-Type&lt;/SPAN&gt; - Determines if the access method of this endpoint has changed. For example, if the same MAC address that connected via Wired Dot1x has been used for Wireless Dot1x and visa-versa.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;DHCP Class ID&lt;/SPAN&gt; - Determines whether the type of client/vendor of endpoint has changed.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;Operating System - &lt;/SPAN&gt;Significant OS changes such as Windows to Apple iOS.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-style: inherit; font-weight: bold; font-size: inherit; font-family: inherit;"&gt;Endpoint Policy - &lt;/SPAN&gt;Significant profile changes. For example, a change from Phone or Printer to PC.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 19:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478853#M520572</guid>
      <dc:creator>Devrat Kamath</dc:creator>
      <dc:date>2017-10-23T19:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 Anomalous Endpoint Detection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478854#M520574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;(3) OS is not a direct attribute used in Anomalous Behavior Detection (ABD) Phase 1. It might be implied from 2 and 4.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Oct 2017 04:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478854#M520574</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-24T04:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 Anomalous Endpoint Detection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478855#M520579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hsing, that makes sense.&amp;nbsp; I spoke to Hariprasad over Jabber and he mentioned as of now the feature requires DHCP-Class-ID to detect the change.&amp;nbsp; In most cases where i speak to customers, we don't expect that a spoofed device will request a DHCP IP, it uses a static IP and spoofs the MAC address. The RADIUS probe MAC OUI won't change and because of lack of other attributes, an OS change or re-profile doesn't trigger and the anomalous detection stays dormant.&amp;nbsp; What are our mandatory conditions for the anomalous detection to trigger is what I'm trying to figure out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 19:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478855#M520579</guid>
      <dc:creator>Devrat Kamath</dc:creator>
      <dc:date>2017-10-26T19:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 Anomalous Endpoint Detection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478856#M520582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See &lt;A href="https://community.cisco.com/message/276519"&gt;Re: Anomalous client detection behaviour&lt;/A&gt; where this topic is covered and specific conditions spelled out.&amp;nbsp; The following TZ article has since been updated as well to more clearly spell out current logic as of ISE 2.3.&lt;/P&gt;&lt;P&gt;&lt;A href="https://techzone.cisco.com/t5/Identity-Services-Engine-ISE/Configure-Anomalous-Endpoint-Detection-and-Enforcement-on-ISE-2/ta-p/1010523" title="https://techzone.cisco.com/t5/Identity-Services-Engine-ISE/Configure-Anomalous-Endpoint-Detection-and-Enforcement-on-ISE-2/ta-p/1010523"&gt;https://techzone.cisco.com/t5/Identity-Services-Engine-ISE/Configure-Anomalous-Endpoint-Detection-and-Enforcement-on-ISE…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Dec 2017 00:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3478856#M520582</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-12-16T00:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 Anomalous Endpoint Detection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3905509#M520586</link>
      <description>&lt;P&gt;Is there an article for public viewing?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 18:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-anomalous-endpoint-detection/m-p/3905509#M520586</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-08T18:03:03Z</dc:date>
    </item>
  </channel>
</rss>

