<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ise best practices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180389#M563673</link>
    <description>&lt;P&gt;There are several best practices guides out there for ISE in general and specific solutions.&amp;nbsp; Here a few that may assist:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-6/b_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-6/b_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ciscocustomer.lookbookhq.com/iseguidedjourney/BYOD-configuration" target="_blank"&gt;https://ciscocustomer.lookbookhq.com/iseguidedjourney/BYOD-configuration&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I am not aware of a tool that will run the checks for you.&amp;nbsp; HTH!&lt;/P&gt;</description>
    <pubDate>Sat, 07 Nov 2020 21:31:52 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2020-11-07T21:31:52Z</dc:date>
    <item>
      <title>Cisco ise best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180363#M563672</link>
      <description>&lt;P&gt;Hi everyone, I have security audit on Cisco ise 2.2 to review the configuration just for wireless. Can I find a checklist related to ise 2.2 ? Also is there any tool to conduct a scan on the configuration?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I hope find answers and thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Nov 2020 18:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180363#M563672</guid>
      <dc:creator>AzizAli02220</dc:creator>
      <dc:date>2020-11-07T18:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ise best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180389#M563673</link>
      <description>&lt;P&gt;There are several best practices guides out there for ISE in general and specific solutions.&amp;nbsp; Here a few that may assist:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-6/b_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-6/b_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ciscocustomer.lookbookhq.com/iseguidedjourney/BYOD-configuration" target="_blank"&gt;https://ciscocustomer.lookbookhq.com/iseguidedjourney/BYOD-configuration&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I am not aware of a tool that will run the checks for you.&amp;nbsp; HTH!&lt;/P&gt;</description>
      <pubDate>Sat, 07 Nov 2020 21:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180389#M563673</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-11-07T21:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ise best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180694#M563701</link>
      <description>&lt;P&gt;Dear Mike thanks a lot for your answer.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 06:31:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-best-practices/m-p/4180694#M563701</guid>
      <dc:creator>AzizAli02220</dc:creator>
      <dc:date>2020-11-09T06:31:12Z</dc:date>
    </item>
  </channel>
</rss>

