<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497678#M570847</link>
    <description>&lt;P&gt;Thanks for the answer. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Guess we will wait then.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Nov 2021 08:13:37 GMT</pubDate>
    <dc:creator>hendrikfuest</dc:creator>
    <dc:date>2021-11-04T08:13:37Z</dc:date>
    <item>
      <title>ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497047#M570810</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE 2.7p5&lt;BR /&gt;Windows 2019&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently implemented ISE-PIC using WMI at a customer.&lt;BR /&gt;In the setup process we noticed error events (10036 [&lt;SPAN&gt;Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application&lt;/SPAN&gt;]) on the Domain Controller. After searching for the cause and finding a &lt;A href="https://docs.microsoft.com/en-us/answers/questions/564347/server-2019-update-kb5005568-sept-2021-forcing-new.html" target="_blank" rel="noopener"&gt;similar problem&lt;/A&gt;, we removed &lt;A href="https://support.microsoft.com/en-us/topic/september-14-2021-kb5005568-os-build-17763-2183-d19b2778-204a-4c09-a0c3-23dc28d5deac" target="_self"&gt;KB5005568&lt;/A&gt; (workarounds did not help) from the Domain Controllers and were able to get WMI and ISE-PIC running.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like Microsoft changed something regarding DCOM in &lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_self"&gt;KB5004442&lt;/A&gt; and enforced it prematurely in KB5005568.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The customer is now asking when they can reapply the Windows updates? Is ISE-PIC going to fail again?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;example ISE WMI Log:&lt;BR /&gt;2021-10-14 09:20:50,657 ERROR [PassiveID-WMI-InitConnection][] com.cisco.idc.dc-probe- Error reading NetBios: Access is denied, please check whether the [domain-username-password] are correct. Also, if not already done please check the GETTING STARTED and FAQ sections in readme.htm. They provide information on how to correctly configure the Windows machine for DCOM access, so as to avoid such exceptions. [0x00000005]{Identity Mapping.wmi-class=Win32_NTDomain, Identity Mapping.dc-domainname=&amp;lt;domain&amp;gt;, Identity Mapping.dc-name=&amp;lt;dc-fqdn&amp;gt;, Identity Mapping.dc-host=&amp;lt;dc-fqdn&amp;gt;/&amp;lt;dc-ip&amp;gt;, Identity Mapping.wmi-property=DomainName}&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Anyone else ran into this problem?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Hendrik&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 09:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497047#M570810</guid>
      <dc:creator>hendrikfuest</dc:creator>
      <dc:date>2021-11-03T09:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497502#M570836</link>
      <description>&lt;P&gt;An enhancement bug has been filed for using Kerberos instead of NTLM for Passive ID. Until that is possible, this MS security patch will likely need to be removed.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;ISE-PIC 3.1 supports using MSRPC instead of WMI for Passive ID. You could try testing with it in a lab, but I believe MSRPC is still NTLM-based, so it may also fail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 21:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497502#M570836</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-11-03T21:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497678#M570847</link>
      <description>&lt;P&gt;Thanks for the answer. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Guess we will wait then.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 08:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4497678#M570847</guid>
      <dc:creator>hendrikfuest</dc:creator>
      <dc:date>2021-11-04T08:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4543548#M572540</link>
      <description>&lt;P&gt;What if you stopped using ISE-PIC and just use Active Identity instead? We have ISE-PIC tied into our AD environment and using PXGRID services for USER to IP mapping for FMC firewall policies to work correctly. Is there a downside to switching over to active identity?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 17:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4543548#M572540</guid>
      <dc:creator>lifesouthhd</dc:creator>
      <dc:date>2022-02-01T17:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4665771#M576600</link>
      <description>&lt;P&gt;Is there any resolution or workaround on this. The date when the MS patch will not be able to deactivate is approaching (03/2023). Since then PassiveID/WMI stops working.&amp;nbsp; Any comment appreciated.&lt;/P&gt;
&lt;P&gt;Thanks Roman&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 14:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4665771#M576600</guid>
      <dc:creator>RomanMikes95774</dc:creator>
      <dc:date>2022-08-08T14:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4781499#M580051</link>
      <description>&lt;P&gt;MS-RPC agent solves the issue. It doesn't require the DCOM privilages like the WMI access does.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 16:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4781499#M580051</guid>
      <dc:creator>RomanMikes95774</dc:creator>
      <dc:date>2023-02-23T16:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4781549#M580053</link>
      <description>&lt;P&gt;Resurrecting a 2-year old thread that has an accepted solution limits the number of people that will take a look at it.&amp;nbsp; The best thing to do is to start a new thread.&lt;/P&gt;
&lt;P&gt;Check out this article to solve the issue&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216512-configure-evt-based-identity-services-en.html" target="_self"&gt;Configure EVT-Based Identity Services Engine Passive ID Agent&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 17:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4781549#M580053</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2023-02-23T17:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-PIC WMI failing on Windows Server 2019 with KB5005568</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4798916#M580658</link>
      <description>&lt;P&gt;lol, so Cisco has gone back to needing an agent installed on the dc, we've gone full circle!&lt;/P&gt;&lt;P&gt;Why didnt you guys just implement WinRM over HTTPS like Palo and call it a day?&lt;/P&gt;&lt;P&gt;Cisco really does love making things harder than they need to be.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 00:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic-wmi-failing-on-windows-server-2019-with-kb5005568/m-p/4798916#M580658</guid>
      <dc:creator>evan.leipold</dc:creator>
      <dc:date>2023-03-22T00:15:52Z</dc:date>
    </item>
  </channel>
</rss>

