<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Profiler with Azure AD or Intune in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4641605#M575824</link>
    <description>&lt;P&gt;I am having a problem (ISE 3.0) where we are moving some of our PCs to be Azure AD joined only.&amp;nbsp; &amp;nbsp; As such I am losing access to the AD Probe built into ISE for profiling.&amp;nbsp; Without this probe, the built in profile conditions classify my Windows 11 boxes as Windows XP and by policy ISE disables the port.&amp;nbsp; &amp;nbsp; Is there a way to have a probe that would use the Azure AD or Intune to supply information to the profile engine?&amp;nbsp; Other work around ideas are welcome.&amp;nbsp; &amp;nbsp;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jun 2022 13:25:23 GMT</pubDate>
    <dc:creator>davidgrothe</dc:creator>
    <dc:date>2022-06-30T13:25:23Z</dc:date>
    <item>
      <title>ISE Profiler with Azure AD or Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4641605#M575824</link>
      <description>&lt;P&gt;I am having a problem (ISE 3.0) where we are moving some of our PCs to be Azure AD joined only.&amp;nbsp; &amp;nbsp; As such I am losing access to the AD Probe built into ISE for profiling.&amp;nbsp; Without this probe, the built in profile conditions classify my Windows 11 boxes as Windows XP and by policy ISE disables the port.&amp;nbsp; &amp;nbsp; Is there a way to have a probe that would use the Azure AD or Intune to supply information to the profile engine?&amp;nbsp; Other work around ideas are welcome.&amp;nbsp; &amp;nbsp;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 13:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4641605#M575824</guid>
      <dc:creator>davidgrothe</dc:creator>
      <dc:date>2022-06-30T13:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiler with Azure AD or Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4641631#M575828</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can't get the windows version in the intune response to ISE (definitely&lt;BR /&gt;Intune captures that but don't pass it to ISE).&lt;BR /&gt;&lt;BR /&gt;Here is a docs which give example of intune gives (basically compliant&lt;BR /&gt;parameters but not client OS version).&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Jun 2022 14:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4641631#M575828</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-06-30T14:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiler with Azure AD or Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4642059#M575845</link>
      <description>&lt;P&gt;Using Profiler conditions like Windows version in your AuthZ Policies is problematic to begin with. These are easily spoofed and applications (like MS Skype for Business) have wreaked havoc in the past and resulted in erratic Profile changes.&lt;/P&gt;
&lt;P&gt;A better approach would be to use active authentication like 802.1x EAP-TLS for your legitimate Corp Windows PCs and restrict access for everything else.&lt;BR /&gt;Moving to Azure AD Joined will reduce the options for authenticating the Windows endpoints. You can't authenticate a computer/user against AAD with EAP-TLS (even with the upcoming feature enhancement in ISE 3.2). The best you will be able to do is authenticate the Windows computer/user based purely on a valid and trusted certificate in ISE, then authorize based on other conditions like Intune MDM Registration/Compliance.&lt;/P&gt;
&lt;P&gt;If this is the plan, I would highly suggest moving to ISE 3.1 ASAP to take advantage of the new MDM APIv3 with Intune. This will allow ISE to use the GUID for performing MDM checks against Intune as opposed to the 'legacy' MAC address based check. The latter obviously causes lots of issues with wired dongles/docks and random/changing wireless MAC addresses.&lt;BR /&gt;See &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank" rel="noopener"&gt;Integrate MDM and UEM Servers with Cisco ISE&lt;/A&gt; for info on how to integrate Intune with ISE 3.1 using MDM APIv3 and the MS Graph API.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 22:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiler-with-azure-ad-or-intune/m-p/4642059#M575845</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-06-30T22:29:19Z</dc:date>
    </item>
  </channel>
</rss>

