<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integrating ISE with Azure Intune as MDM in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4501381#M571015</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I made it up last week with the help of Cisco TAC, so I confirm I'm now able to reach Intune as external MDM server with ISE 3.0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We indeed added extra permissions on Intune's side. Cisco tech confirmed the pemissions are intended to be deprecated by Intune, but they don't have anything to replace it, and the deprecation is not effective currently. So we have no choice but to use these deprecated permission.&lt;/P&gt;&lt;P&gt;=&amp;gt; "Azure Active Directory Graph"&lt;/P&gt;&lt;P&gt;==&amp;gt; Delegated :&amp;nbsp; Directory- Read ALL&lt;/P&gt;&lt;P&gt;==&amp;gt; Delegated : User - Read ALL&lt;/P&gt;&lt;P&gt;==&amp;gt; Application : read All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did also ensure the public CAs in the Trusted store have the "Trust Cisco Services" checked. It concerns for example :&lt;/P&gt;&lt;P&gt;- Baltimore CA&lt;BR /&gt;- DigiCert SHA2&lt;/P&gt;&lt;P&gt;- DigiCert Global Root CA&lt;/P&gt;&lt;P&gt;- DigiCert Global Root G2&lt;/P&gt;&lt;P&gt;- Microsoft Azure TLS Issuing CA 01&lt;/P&gt;&lt;P&gt;- Microsoft Azure TLS Issuing CA 02&lt;/P&gt;&lt;P&gt;-... and more&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, these changes in Intune took a couple of minutes to be effective.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Nov 2021 10:15:45 GMT</pubDate>
    <dc:creator>Kalipso</dc:creator>
    <dc:date>2021-11-11T10:15:45Z</dc:date>
    <item>
      <title>Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480298#M570179</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to use Computer authentication with Azure AD.&lt;/P&gt;&lt;P&gt;As Azure AD only works with SAML, and ROPC only allows EAP-TTLS ie user authentication , I'm looking into Intune as a MDM server.&lt;/P&gt;&lt;P&gt;I've followed all the procedure here :&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The certificates are trusted both sides, but when I test the connection I get the following error :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Connection to server failed with:&lt;/P&gt;&lt;P class="text-danger"&gt;Unrecognized field "requestId" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorOdata), not marked as ignorable at [Source: java.io.StringReader@20d9ea84; line: 1, column: 152] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse["odata.error"]-&amp;gt;com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorOdata["requestId"])&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please try with different settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet capture shows one connection to the token URL, so I guess the token retrieval is ok, then another connection to the discovery URL &lt;STRONG&gt;&lt;A href="https://graph.windows.net/&amp;lt;Tenant" target="_blank" rel="noopener"&gt;https://graph.windows.net/&amp;lt;Tenant&lt;/A&gt; ID&amp;gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We are running version 3.0 Patch 4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone knows how to resolve this ?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 12:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480298#M570179</guid>
      <dc:creator>Kalipso</dc:creator>
      <dc:date>2021-10-05T12:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480657#M570198</link>
      <description>&lt;P&gt;I've also just run into this issue today with ISE 3.1 &amp;lt;no patch&amp;gt;. Will advise if I make any progress...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My error for ref:&lt;/P&gt;&lt;P&gt;Connection to server failed with:&lt;/P&gt;&lt;P&gt;Unrecognized field "requestId" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorOdata), not marked as ignorable at [Source: java.io.StringReader@21e0ae84; line: 1, column: 152] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse["odata.error"]-&lt;BR /&gt;&amp;gt;com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorOdata["requestId"])&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please try with different settings.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 23:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480657#M570198</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2021-10-05T23:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480693#M570201</link>
      <description>&lt;P&gt;The Cisco documentation (link from OP) indicates a different Auto Discovery URL than my Azure tenancy...&lt;/P&gt;&lt;P&gt;Azure: 'Azure AD &amp;gt; ISE_Intune &amp;gt; Overview &amp;gt; Endpoints' =&amp;nbsp;&lt;A href="https://graph.microsoft.com" target="_blank" rel="noopener"&gt;https://graph.microsoft.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;From Cisco Doco:&lt;SPAN&gt;&amp;nbsp;“&lt;A href="https://graph" target="_blank" rel="noopener"&gt;https://graph&lt;/A&gt;.&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;windows.net&lt;/FONT&gt;&lt;SPAN&gt;/&lt;/SPAN&gt;&lt;EM&gt;&amp;lt;Directory (tenant) ID&amp;gt;&lt;/EM&gt;&lt;SPAN&gt;”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-left"&gt;When I update to&amp;nbsp; 'graph.&lt;FONT color="#339966"&gt;microsoft.com&lt;/FONT&gt;/&amp;lt;tenant_id&amp;gt;', it still fails, but gives a different error:&lt;/P&gt;&lt;P&gt;Unrecognized field "error" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse), not marked as ignorable at [Source: java.io.StringReader@820198b; line: 1, column: 11] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse["error"])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also find I cant add permissions for 'Azure Active Directory Graph' as it has been deprecated. (My Azure instance is a brand new lab env, though Cisco Docs still indicate this is needed...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have deleted the Azure App, and re-added - still no luck...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 01:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480693#M570201</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2021-10-06T01:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480755#M570204</link>
      <description>&lt;P&gt;I got my integration working. I had to use the Auto Discovery URL from the Cisco guide, NOT the one from the Azure portal Endpoints page. I u&lt;FONT color="#000000"&gt;sed:&amp;nbsp;&lt;SPAN&gt;“&lt;A href="https://graph/" target="_blank" rel="noopener nofollow noreferrer"&gt;https://graph&lt;/A&gt;.&lt;/SPAN&gt;windows.net&lt;SPAN&gt;/&lt;/SPAN&gt;&lt;/FONT&gt;&lt;EM&gt;&lt;FONT color="#000000"&gt;&amp;lt;Director&lt;/FONT&gt;y (tenant) ID&amp;gt;&lt;/EM&gt;&lt;SPAN&gt;”, which is the same as you have....&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I think my main issue was that I hadn't enabled ISE ERS; so try doing that 'Administration &amp;gt; System &amp;gt; Settings &amp;gt; API Settings'. I initially enabled both ERS and OpenAPI; I'm not certain which is required, but think probably ERS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I had also found a way to add the Permissions for the deprecated 'Azure Active Directory Graph' API; I had to do this by manually updating the Manifest - you can't do it in GUI any more. Not sure if this is actually required, however if you want/need to try it, add the following in the "requiredResourceAccess" section near the end.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope that helps you with your issue...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tim&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;		{
			"resourceAppId": "00000002-0000-0000-c000-000000000000",
			"resourceAccess": [
				{
					"id": "c582532d-9d9e-43bd-a97c-2667a28ce295",
					"type": "Scope"
				},
				{
					"id": "5778995a-e1bf-45b8-affa-663a9f3f4d04",
					"type": "Scope"
				},
				{
					"id": "5778995a-e1bf-45b8-affa-663a9f3f4d04",
					"type": "Role"
				}
			]
		},&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 05:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4480755#M570204</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2021-10-06T05:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4483427#M570306</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/226133"&gt;@Tim Fairclough&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've checked that ESR API is enabled, and I've added the deprecated privileges in the manifest.xml.&lt;/P&gt;&lt;P&gt;Without success...&lt;/P&gt;&lt;P&gt;I've even tried to use the token issuing URL v1 instead of v2 but I've still have the error : Unrecognized field "requestId".&lt;/P&gt;&lt;P&gt;I'll open a case to require asssistance on this feature, I'll let you know if we found something.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 08:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4483427#M570306</guid>
      <dc:creator>Kalipso</dc:creator>
      <dc:date>2021-10-11T08:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4484028#M570324</link>
      <description>&lt;P&gt;Good luck with TAC, I'm sure they'll get you past this hurdle.&lt;/P&gt;&lt;P&gt;Now that my Intune integration is working, will summarise my findings for you as I expect we have similar goals / hopes, and this might save you some time...&lt;/P&gt;&lt;P&gt;I have Intune deploying SCEP User and Computer certs to my test device, as well as an EAP-TLS WiFi profile. While I can write policy in ISE to authorise the EAP-TLS machine auth, I haven't found a way to actually authorise the machine account against AAD. I have Authz rule checking MDM:DeviceRegisterStatus and MDM:DeviceComplianceStatus working, but if I disable the 'device' in AAD&amp;gt;Devices, it can still connect - I expected this would also disable the device in Intune, but it doesn't seem to...&lt;/P&gt;&lt;P&gt;Additionally, it isn't possible to do EAP-TLS User authz against Azure natively either; so no way to check if the account is still active or what group memberships it has (though you could put some of this info into a Cert SAN field).&lt;/P&gt;&lt;P&gt;I installed Azure AD Directory Services in my tenancy, and have configured an LDAPS connection in ISE. I can now use that to authorise EAP-TLS User auth's, but do not see any LDAP groups that contain my AAD joined computer. I had setup my AADDS 'Forest Type' as 'User' rather than 'Resource'; so perhaps things might have been different if I had selected Resource Forest... Note, I COULD see&lt;/P&gt;&lt;P&gt;At this point, my 'AAD Computer' authz policy will need to rely on devices actually being deleted from AAD and Intune, rather than simply disabling the 'AAD Device' as I have tried.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using PDP.Exe, I cant see my AzureAD Joined computer...:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP Container - no computers copy.png" style="width: 452px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134022iDCC804EB17515835/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP Container - no computers copy.png" alt="LDAP Container - no computers copy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please post if you manage to get Computer Authentication working against AAD / AADDS, or some other 'cloud native' way!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create AADDS instance:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory-domain-services/tutorial-create-instance" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/azure/active-directory-domain-services/tutorial-create-instance&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Enable LDAPS in AADDS:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory-domain-services/tutorial-configure-ldaps" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/azure/active-directory-domain-services/tutorial-configure-ldaps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;AuthZ policy:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screen Shot 2021-10-12 at 11.25.23 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134013i35A1CA701958CCB9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-10-12 at 11.25.23 am.png" alt="Screen Shot 2021-10-12 at 11.25.23 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Oct 2021 03:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4484028#M570324</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2021-10-12T03:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4501316#M571008</link>
      <description>&lt;P&gt;Hi Marie,&lt;/P&gt;&lt;P&gt;This is likely a Azure permissions issue.&lt;/P&gt;&lt;P&gt;I guess you should check out Cisco bug ID&amp;nbsp;CSCvz85536 which describes how these Azure Active Directory Graph permissions can be set despite the fact that they are greyed out by default and will become deprecated in june 2022.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know about any initiatives by Cisco to properly fix this issue, instead of continuing to leverage soon-deprecated/legacy Azure permissions. Can't find anything in Cisco documentation or online.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Cisco employees in the community have any thoughts on this issue or bug ID (CSCvz85536)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 08:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4501316#M571008</guid>
      <dc:creator>erwindebrouwer</dc:creator>
      <dc:date>2021-11-11T08:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4501381#M571015</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I made it up last week with the help of Cisco TAC, so I confirm I'm now able to reach Intune as external MDM server with ISE 3.0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We indeed added extra permissions on Intune's side. Cisco tech confirmed the pemissions are intended to be deprecated by Intune, but they don't have anything to replace it, and the deprecation is not effective currently. So we have no choice but to use these deprecated permission.&lt;/P&gt;&lt;P&gt;=&amp;gt; "Azure Active Directory Graph"&lt;/P&gt;&lt;P&gt;==&amp;gt; Delegated :&amp;nbsp; Directory- Read ALL&lt;/P&gt;&lt;P&gt;==&amp;gt; Delegated : User - Read ALL&lt;/P&gt;&lt;P&gt;==&amp;gt; Application : read All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did also ensure the public CAs in the Trusted store have the "Trust Cisco Services" checked. It concerns for example :&lt;/P&gt;&lt;P&gt;- Baltimore CA&lt;BR /&gt;- DigiCert SHA2&lt;/P&gt;&lt;P&gt;- DigiCert Global Root CA&lt;/P&gt;&lt;P&gt;- DigiCert Global Root G2&lt;/P&gt;&lt;P&gt;- Microsoft Azure TLS Issuing CA 01&lt;/P&gt;&lt;P&gt;- Microsoft Azure TLS Issuing CA 02&lt;/P&gt;&lt;P&gt;-... and more&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, these changes in Intune took a couple of minutes to be effective.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 10:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4501381#M571015</guid>
      <dc:creator>Kalipso</dc:creator>
      <dc:date>2021-11-11T10:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682066#M577123</link>
      <description>&lt;P&gt;Hi, is there any new update from Cisco? Or should we still keeping using old Azure Active Directory Graph permissions? Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 13:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682066#M577123</guid>
      <dc:creator>matg</dc:creator>
      <dc:date>2022-09-06T13:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682324#M577126</link>
      <description>&lt;P&gt;The requirements and permissions required for integrating ISE with Intune MDM via the Microsoft Graph API are documented here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Note that you will need ISE version 3.1+ to leverage the MDM APIv3 and GUID based lookups against Intune.&lt;/P&gt;
&lt;P&gt;You may also want to be aware of this Field Notice related to MS deprecating the API that supports MAC Address lookups for MDM compliance.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72427.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72427.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 23:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682324#M577126</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-09-06T23:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682867#M577141</link>
      <description>&lt;P&gt;Thank you for your reply, so we are still forced to use Azure Active Directory Graph which is going to be deprecated by Microsoft on 31st of March 2023.&lt;/P&gt;&lt;P&gt;Does Cisco have any plan what to do after Azure Active Directory Graph will be no more available ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366" target="_blank"&gt;https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366&lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;&lt;EM&gt;Update 7/29/2022:&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&amp;nbsp;We have updated the retirement date of the Azure AD Graph and MSOnline PowerShell &lt;STRONG&gt;licensing assignment &lt;/STRONG&gt;APIs and PowerShell cmdlets for &lt;STRONG&gt;existing tenants&lt;/STRONG&gt; to March 31, 2023. APIs and Cmdlets will not work for &lt;STRONG&gt;new tenants&lt;/STRONG&gt; created after November 1, 2022. Customers may notice performance delays as we approach the retirement deadline, so we recommend prioritizing migration to MS Graph following the guidance below and&amp;nbsp;in &lt;A href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmicrosoftgraph%2Fazuread-msoline-cmdlet-map%3Fview%3Dgraph-powershell-1.0&amp;amp;data=05%7C01%7Csdriggers%40affirma.com%7C73fb20f840e14ae8e38008da7181ba14%7C65265dd04b2044a4aca4b7ecbb143664%7C0%7C0%7C637947099251718553%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;amp;sdata=b5oI1ZtUnTEXTFXaCD0QNaiMgYsQLgQc9%2BQmdIgCDKE%3D&amp;amp;reserved=0" target="_blank" rel="noopener nofollow noreferrer"&gt;Find Azure AD and MSOnline cmdlets in Microsoft Graph PowerShell | Microsoft Docs&lt;/A&gt;.&lt;/EM&gt;"&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 14:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4682867#M577141</guid>
      <dc:creator>matg</dc:creator>
      <dc:date>2022-09-07T14:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4683099#M577147</link>
      <description>&lt;P&gt;I'm not sure I understand your comment "so we are still forced to use Azure Active Directory Graph". The document I shared discusses the steps to migrate from the legacy Azure AD Graph to the newer Microsoft Graph API. With the MS Graph API, any lookups against Intune for MDM Compliance must use the GUID.&lt;/P&gt;
&lt;P&gt;After MS retires the legacy Azure AD Graph API, Cisco ISE will have no way to do MDM Compliance lookups against Intune with any non-GUID methods (including MAC Address). This is a MS decision that Cisco has no control over.&lt;/P&gt;
&lt;P&gt;I'm not aware of any plans to update the MDM API in older ISE versions, so Intune integration using the MS Graph API and GUID will require customers to upgrade to ISE version 3.1 or newer.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 22:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4683099#M577147</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-09-07T22:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4683118#M577149</link>
      <description>&lt;P&gt;You might also want to have a look at the ISE webinar I delivered last month for &lt;A href="https://www.youtube.com/watch?v=iAKyIHFqbgE" target="_blank" rel="noopener"&gt;ISE Integration with Intune MDM&lt;/A&gt;.&lt;BR /&gt;I discuss some of the flows related to the Intune MDM Compliance Checks using ISE 3.1 as well as the feature enhancement in ISE 3.2 (recently released) for EAP-TLS User auth against Azure AD + Intune MDM Compliance check using the GUID.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 23:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4683118#M577149</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-09-07T23:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4685984#M577216</link>
      <description>&lt;P&gt;I will use guide &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html&lt;/A&gt; as a reference. In the guide it says:&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;After you update Cisco ISE to one of the supported versions, in each Microsoft Intune server integration in Cisco ISE, manually update the &lt;SPAN class=""&gt;Auto Discovery URL&lt;/SPAN&gt; field (Step 32).&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;Replace &lt;STRONG&gt;&lt;A href="https://graph.windows.net" target="_blank" rel="noopener"&gt;https://graph.windows.net&lt;/A&gt;&amp;lt;Directory (tenant) ID&amp;gt;&lt;/STRONG&gt; with &lt;STRONG&gt;&lt;A href="https://graph.microsoft.com" target="_blank" rel="noopener"&gt;https://graph.microsoft.com&lt;/A&gt;&lt;/STRONG&gt;.&lt;/EM&gt;"&lt;/P&gt;&lt;P class=""&gt;but then later on it says that we should use old connector:&lt;/P&gt;&lt;P class=""&gt;"&lt;EM&gt;The following fields require the information from the Microsoft Intune application in the Microsoft Azure Active Directory:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;EM&gt;In the &lt;SPAN class=""&gt;Auto Discovery URL&lt;/SPAN&gt; field, enter &lt;STRONG&gt;&lt;A href="https://graph.windows.net/" target="_blank" rel="noopener"&gt;https://graph.windows.net/&lt;/A&gt;&amp;lt;Directory (tenant) ID&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt;"&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When use Auto Discovery URL with the old connector (&lt;A href="https://graph.windows.net/" target="_blank" rel="noopener"&gt;https://graph.windows.net/&lt;/A&gt;&amp;lt;Directory (tenant)ID&amp;gt;), connection to MDM server works, but when I try to use new connector (&lt;A href="https://graph.microsoft.com/" target="_blank" rel="noopener"&gt;https://graph.microsoft.com/&lt;/A&gt;&amp;lt;Directory (tenant)ID&amp;gt;) ; Test Connection is giving me following error:&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;Connection to server failed with:&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;Unrecognized field "error" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;rectoryServiceErrorResponse), not marked as ignorable at [Source: java.io.StringReader@714fbb3c; line: 1, column: 11] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;rectoryServiceErrorResponse["error"])&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;Please try with different settings.&lt;/EM&gt;"&lt;/P&gt;&lt;P class=""&gt;The API permissions which we are using are the same as API permissions mentioned in the guide, our API permissions:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="matg_0-1663057739090.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/162328iF792A0683DC43241/image-size/medium?v=v2&amp;amp;px=400" role="button" title="matg_0-1663057739090.png" alt="matg_0-1663057739090.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So my statement that "we are still forced to use Azure Active Directory Graph" was basically reflecting that connection to Intune MDM doesn't work with new &lt;A href="https://graph.microsoft.com" target="_blank" rel="noopener"&gt;https://graph.microsoft.com&lt;/A&gt; auto discovery url.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 08:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4685984#M577216</guid>
      <dc:creator>matg</dc:creator>
      <dc:date>2022-09-13T08:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4686559#M577222</link>
      <description>&lt;P&gt;The reference to&amp;nbsp;&lt;STRONG class="ph b"&gt;&lt;A href="https://graph.windows.net/" target="_blank"&gt;https://graph.windows.net/&lt;/A&gt;&lt;EM class="ph i"&gt;&amp;lt;Directory (tenant) ID&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt; in Step 32 of the document is a mistake. The Auto Discovery URL field should be configured as &lt;EM&gt;&lt;STRONG&gt;&lt;A href="https://graph.microsoft.com" target="_blank"&gt;https://graph.microsoft.com&lt;/A&gt;&lt;/STRONG&gt;&lt;/EM&gt;. You are likely getting the error as there is no &amp;lt;Directory (tentant) ID&amp;gt; value after this.&lt;/P&gt;
&lt;P&gt;Example from my lab:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-09-14 at 8.32.12 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/162382i384D6E7931A9E6BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2022-09-14 at 8.32.12 am.png" alt="Screen Shot 2022-09-14 at 8.32.12 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 22:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4686559#M577222</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-09-13T22:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4687622#M577252</link>
      <description>&lt;P&gt;Wonderful, thank you Greg, it works!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 07:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4687622#M577252</guid>
      <dc:creator>matg</dc:creator>
      <dc:date>2022-09-15T07:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4735524#M578739</link>
      <description>&lt;P&gt;When integrating Intune with Cisco ISE, we used the API permission from &lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375&lt;/A&gt; and Auto Discovery URL: &lt;A href="https://graph.windows.net/" target="_blank"&gt;https://graph.windows.net/&lt;/A&gt;&amp;lt; Directory (tenant) ID&amp;gt; instead of these latest settings. Cisco ISE connects to Azure but we can't get the mobile devices to connect to the WLAN. Can changing the settings to those of &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html&lt;/A&gt; help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 10:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4735524#M578739</guid>
      <dc:creator>Bernard82</dc:creator>
      <dc:date>2022-12-09T10:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4743154#M578937</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;In response of all the information, I have got this issue and I cant get why this is happening.&lt;BR /&gt;Maybe I'm overlooking something, and you can help me this this.&lt;BR /&gt;The External MDM connection is working oke, test connection is oke. And I did a test based on MAC address and this also works oke.&lt;BR /&gt;But I want to use the GUID solution.&lt;/P&gt;
&lt;P&gt;I have got a Machine with a certificate with SAN URI attribute:&lt;BR /&gt;URL=ID:Microsoft Endpoint Manager:GUID:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx&lt;BR /&gt;The GUID is the Intune ID of the Device. I double checked this.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mverbon_0-1671617794099.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171577i48345A17FC8BDFEA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mverbon_0-1671617794099.png" alt="mverbon_0-1671617794099.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the ISE configuration I configured the use of Cert - SAN URI, GUID&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mverbon_1-1671617873847.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171578i688EAD5CD20AB30B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mverbon_1-1671617873847.png" alt="mverbon_1-1671617873847.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;But it is not working as expected.&lt;/P&gt;
&lt;P&gt;The URI is seen in the live logging of the session, Subject Alternative Name - URI:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mverbon_2-1671618291089.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171580i186C2AD202E16141/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mverbon_2-1671618291089.png" alt="mverbon_2-1671618291089.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the logging I see this, value is 'null'&lt;/P&gt;
&lt;P&gt;2022-12-21 10:23:43,221 DEBUG [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- SESSION IS NOT NULL &amp;amp; CERTIFICATE.CN Field value is - 'null' and CERTIFICATE.SAN DNS Field value is - 'null' and CERTIFICATE.CERT_SANURI_KEY Field value is -'null' &lt;BR /&gt;2022-12-21 10:23:43,221 DEBUG [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- Actual check of CERTIFICATE.CN Field value is - 'null' and CERTIFICATE.SAN DNS Field value is - 'null' and CERTIFICATE.CERT_SANURI_KEY Field value is -'null' &lt;BR /&gt;2022-12-21 10:23:43,221 DEBUG [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- ise db/cache Configured device Identifier source order values are : CERT_SANURI_GUID&lt;BR /&gt;2022-12-21 10:23:43,221 DEBUG [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- Checking the current deviceIdentifier value : CERT_SANURI_GUID&lt;BR /&gt;2022-12-21 10:23:43,221 DEBUG [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- The value for the DeviceIdentifier Source 'CERT_SANURI_GUID' is 'NULL', hence checking the next Device Identifier source..!&lt;BR /&gt;2022-12-21 10:23:43,221 INFO [Thread-240][[]] cisco.cpm.mdm.pip.MdmPartnerPIPHandler -::::- The value for the deviceIdentifier type of 'null' is - 'null'&lt;/P&gt;
&lt;P&gt;Can anyone point me in the right direction why this is not working?&lt;/P&gt;
&lt;P&gt;Thanks, Martin&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 10:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4743154#M578937</guid>
      <dc:creator>mverbon</dc:creator>
      <dc:date>2022-12-21T10:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4744248#M578953</link>
      <description>&lt;P&gt;The same question was posted on the ISE Bar Webex space, so copying the responses here for the benefit of others.&lt;/P&gt;
&lt;P&gt;In your Intune MDM configuration, do you see the text stating that it supports APIv3? If not, then your App may not be configured correctly in Azure.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2022-12-23 at 8.13.56 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171830iA42987DD6B999005/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2022-12-23 at 8.13.56 am.png" alt="Screenshot 2022-12-23 at 8.13.56 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If the App and ISE are configured correction, you should also see the GUID in the Live Logs for the session. Are you seeing this?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2022-12-23 at 8.24.10 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171831i13FBC4DB5BFD566A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2022-12-23 at 8.24.10 am.png" alt="Screenshot 2022-12-23 at 8.24.10 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 21:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4744248#M578953</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-12-22T21:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating ISE with Azure Intune as MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4745470#M578977</link>
      <description>&lt;P&gt;Thanks for the reply. Yes, ISE version is 3.2. And ISE is connected by API Version 3. And the Device Identifiers are configurable for all 3 options.&lt;BR /&gt;I also checked the logging, but I don't see the GUID in the live logging.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2022 08:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integrating-ise-with-azure-intune-as-mdm/m-p/4745470#M578977</guid>
      <dc:creator>mverbon</dc:creator>
      <dc:date>2022-12-27T08:12:46Z</dc:date>
    </item>
  </channel>
</rss>

