<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Report based on TLS version used by endpoints in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4042786#M558677</link>
    <description>AKAIK there is not a direct report you can run to target that.  However, you could run a report on Top N Authentication by Failure Reason, and create a rule like this: Failure reason contains TLS.  This would report how many endpoints are failing auth due to TLS issues.  Do you use the ise posture module? If so, you could setup a registry check to determine what your hosts are configured to use from a Windows perspective: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13.  That key is specifically applicable to EAP TLS and PEAP.  There may be some other keys you could leverage as well.  Good luck &amp;amp; HTH!</description>
    <pubDate>Mon, 09 Mar 2020 13:51:27 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2020-03-09T13:51:27Z</dc:date>
    <item>
      <title>Report based on TLS version used by endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4042646#M558669</link>
      <description>&lt;P&gt;Hello Experts,&lt;BR /&gt;I would like to extract reports based on the TLS version being used by the endpoints, as seen here:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco ISE - TLS version.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/68758i0BBCCB77CFCE34D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco ISE - TLS version.png" alt="Cisco ISE - TLS version.png" /&gt;&lt;/span&gt;&lt;BR /&gt;But, was not able to locate such a filter on ISE Reporting, any pointers to the same?&lt;BR /&gt;Or is this something that cannot be extracted from ISE?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 09:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4042646#M558669</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2020-03-09T09:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Report based on TLS version used by endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4042786#M558677</link>
      <description>AKAIK there is not a direct report you can run to target that.  However, you could run a report on Top N Authentication by Failure Reason, and create a rule like this: Failure reason contains TLS.  This would report how many endpoints are failing auth due to TLS issues.  Do you use the ise posture module? If so, you could setup a registry check to determine what your hosts are configured to use from a Windows perspective: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13.  That key is specifically applicable to EAP TLS and PEAP.  There may be some other keys you could leverage as well.  Good luck &amp;amp; HTH!</description>
      <pubDate>Mon, 09 Mar 2020 13:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4042786#M558677</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-03-09T13:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: Report based on TLS version used by endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4044717#M558827</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;Yes, I did try out this way of finding out the endpoints, but this method does not provide an option to extact the report in csv format.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;The report generated in graphical format only...&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;Any workaround to get that report extracted in csv format?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 06:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/report-based-on-tls-version-used-by-endpoints/m-p/4044717#M558827</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2020-03-12T06:11:26Z</dc:date>
    </item>
  </channel>
</rss>

