<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.7 and AD Windows 2019 activation authentication level in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541418#M572454</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jan 2022 16:25:46 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2022-01-28T16:25:46Z</dc:date>
    <item>
      <title>ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541256#M572445</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after upgrading our Active directory environment from Windows 2012 to Windows 2019 and installing the latest security updates from Microsoft (KB5004442), logs on the DC show the following error regarding the connections from ISE.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The server-side authentication level policy does not allow the user &lt;EM&gt;domain&lt;/EM&gt;\user SID (S-1-5-21-9321468-1570001470-2076119496-113405) from address&amp;nbsp;&lt;EM&gt;ISE_ip_address&lt;/EM&gt; to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;According to Microsoft a temp solution would be to change the registry on the DC. But from June2022 this hardening will be permanent (&lt;A title="Microsoft article" href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;Is there something that can be done on ISE side to fix the problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Katerina&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 12:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541256#M572445</guid>
      <dc:creator>katerina.dardoufa</dc:creator>
      <dc:date>2022-01-28T12:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541418#M572454</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz97194&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 16:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541418#M572454</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-01-28T16:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541538#M572459</link>
      <description>&lt;P&gt;Is this about ISE-SCCM server integration (external MDM / Desktop Management) ? It’s always been a nightmare to set up the DCOM and registry privileges.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 19:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4541538#M572459</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2022-01-28T19:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4542412#M572500</link>
      <description>&lt;P&gt;It's affecting the Active Directory as a PassiveID provider via WMI.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 21:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4542412#M572500</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-01-30T21:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4543592#M572543</link>
      <description>&lt;P&gt;&lt;SPAN&gt;What if you stopped using ISE-PIC and just use Active Identity instead? We have ISE-PIC tied into our AD environment and using PXGRID services for USER to IP mapping for FMC firewall policies to work correctly. Is there a downside to switching over to active identity? And no longer using passive-id?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 18:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4543592#M572543</guid>
      <dc:creator>lifesouthhd</dc:creator>
      <dc:date>2022-02-01T18:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 and AD Windows 2019 activation authentication level</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4543999#M572559</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;this is an interesting approach... I will have to contact our partner and see what their thoughts are on the matter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the suggestion &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 11:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-and-ad-windows-2019-activation-authentication-level/m-p/4543999#M572559</guid>
      <dc:creator>katerina.dardoufa</dc:creator>
      <dc:date>2022-02-02T11:58:42Z</dc:date>
    </item>
  </channel>
</rss>

