<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE , Fortimanager, MS Intune in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4727719#M578489</link>
    <description>&lt;P&gt;Hi rangers,&lt;/P&gt;
&lt;P&gt;I have written a couple of posts regarding the integration of Cisco ISE and other platforms/devices and so far looks that everything works as it should be. In more details, for authentication Cisco ISE uses Active Directory to check if a user is vaild and if so, under the authorization part, it uses conditions for different domain groups along with the MDM integration to check if the device(laptop) is registered in Intune. At the same time, Cisco ISE uses different security groups on authorization rules in order to pass them to Fortimanager via pxGrid. Therefore, Fortimanager sees these security groups and apply firewall policies.&lt;/P&gt;
&lt;P&gt;Nonetheless, I have an "issue" which I am not sure if there is a solution. Not all the users from the same active directory group will requite the same firewall policies. So lets say that I have an AD group called HR and I use that under the authorization condition. Furthermore I give to that condition a security group called HR_sgt. In that case all the AD users who belongs to that AD group will get the same firewall policies. As I mentioned above the requirement here is the users on the same group to have different firewall policies by Fortigate which uses the security groups from ISE. I think there is workaround by using conditions for every single user form AD but we are talking about 400 users. By all means a big portion of the users will share the same firewall policies so that is easy but all other users is completed random. The rest users belong to many groups and users on the same groups will .need to have different policies. Is there is a much easier way to do it&amp;nbsp; than to create conditions for every single user? Unless there is another way by using the Intune in the equation. Fortigate uses the AD agent and every time someone logs into a domain pc, the firewall picks up that form the AD and perform policies. I would believe It is not the same with intune (hybrid). By logging in to a MS Intune device the firewall doesn't have some similar(agent) to recognize it.&lt;/P&gt;
&lt;P&gt;Anyway, too much stuff and not sure what would be the most beneficial way to do it. Any help will be really helpful.&lt;/P&gt;
&lt;P&gt;Many Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 24 Nov 2022 21:05:40 GMT</pubDate>
    <dc:creator>Nick Mavrou</dc:creator>
    <dc:date>2022-11-24T21:05:40Z</dc:date>
    <item>
      <title>Cisco ISE , Fortimanager, MS Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4727719#M578489</link>
      <description>&lt;P&gt;Hi rangers,&lt;/P&gt;
&lt;P&gt;I have written a couple of posts regarding the integration of Cisco ISE and other platforms/devices and so far looks that everything works as it should be. In more details, for authentication Cisco ISE uses Active Directory to check if a user is vaild and if so, under the authorization part, it uses conditions for different domain groups along with the MDM integration to check if the device(laptop) is registered in Intune. At the same time, Cisco ISE uses different security groups on authorization rules in order to pass them to Fortimanager via pxGrid. Therefore, Fortimanager sees these security groups and apply firewall policies.&lt;/P&gt;
&lt;P&gt;Nonetheless, I have an "issue" which I am not sure if there is a solution. Not all the users from the same active directory group will requite the same firewall policies. So lets say that I have an AD group called HR and I use that under the authorization condition. Furthermore I give to that condition a security group called HR_sgt. In that case all the AD users who belongs to that AD group will get the same firewall policies. As I mentioned above the requirement here is the users on the same group to have different firewall policies by Fortigate which uses the security groups from ISE. I think there is workaround by using conditions for every single user form AD but we are talking about 400 users. By all means a big portion of the users will share the same firewall policies so that is easy but all other users is completed random. The rest users belong to many groups and users on the same groups will .need to have different policies. Is there is a much easier way to do it&amp;nbsp; than to create conditions for every single user? Unless there is another way by using the Intune in the equation. Fortigate uses the AD agent and every time someone logs into a domain pc, the firewall picks up that form the AD and perform policies. I would believe It is not the same with intune (hybrid). By logging in to a MS Intune device the firewall doesn't have some similar(agent) to recognize it.&lt;/P&gt;
&lt;P&gt;Anyway, too much stuff and not sure what would be the most beneficial way to do it. Any help will be really helpful.&lt;/P&gt;
&lt;P&gt;Many Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 21:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4727719#M578489</guid>
      <dc:creator>Nick Mavrou</dc:creator>
      <dc:date>2022-11-24T21:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE , Fortimanager, MS Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4728259#M578507</link>
      <description>&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;6ab41&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;Thank you for the reply, It turns out that the complexity starts with all\n the components of the network and systems which have to integrate. \nFortigate uses AD FSSO agent for AD so it can pickup all the groups of \nthe AD user and implement policies according to the group. This is when a\n user logs in from a domain PC. On the other hand for the intune hybrid \nPCs, As far I can tell Cisco ISE cannot provide the same behaviour and \nto be honest it doesn’t have to. Firstly when a intune PC connects to \nWiFi and the user adds his credentials, AD does not see that user as \nactive like the domain PC and secondly, the most important part, it cannot replicate \nthe groups the user has in AD and send them as tags into Fortimanager. \nIt can send only 1 to 1 mapping tag per condition under the authz rule. \nAny ideas ??&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;6ab41&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;Thank you for the reply, It turns out that the complexity starts with all\n the components of the network and systems which have to integrate. \nFortigate uses AD FSSO agent for AD so it can pickup all the groups of \nthe AD user and implement policies according to the group. This is when a\n user logs in from a domain PC. On the other hand for the intune hybrid \nPCs, As far I can tell Cisco ISE cannot provide the same behaviour and \nto be honest it doesn’t have to. Firstly when a intune PC connects to \nWiFi and the user adds his credentials, AD does not see that user as \nactive like the domain PC and secondly, the most important part, it cannot replicate \nthe groups the user has in AD and send them as tags into Fortimanager. \nIt can send only 1 to 1 mapping tag per condition under the authz rule. \nAny ideas ??&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;6ab41&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;Thank you for the reply, It turns out that the complexity starts with all\n the components of the network and systems which have to integrate. \nFortigate uses AD FSSO agent for AD so it can pickup all the groups of \nthe AD user and implement policies according to the group. This is when a\n user logs in from a domain PC. On the other hand for the intune hybrid \nPCs, As far I can tell Cisco ISE cannot provide the same behaviour and \nto be honest it doesn’t have to. Firstly when a intune PC connects to \nWiFi and the user adds his credentials, AD does not see that user as \nactive like the domain PC and secondly, the most important part, it cannot replicate \nthe groups the user has in AD and send them as tags into Fortimanager. \nIt can send only 1 to 1 mapping tag per condition under the authz rule. \nAny ideas ??&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;It turns out that the complexity starts with all&lt;BR /&gt;the components of the network and systems which have to integrate.&lt;BR /&gt;Fortigate uses AD FSSO agent for AD so it can pickup all the groups of&lt;BR /&gt;the AD user and implement policies according to the group. This is when a&lt;BR /&gt;user logs in from a domain PC. On the other hand for the intune hybrid&lt;BR /&gt;PCs, As far I can tell Cisco ISE cannot provide the same behaviour and&lt;BR /&gt;to be honest it doesn’t have to. Firstly when a intune PC connects to&lt;BR /&gt;WiFi and the user adds his credentials, AD does not see that user as&lt;BR /&gt;active like the domain PC and secondly, the most important part, it cannot replicate&lt;BR /&gt;the groups the user has in AD and send them as tags into Fortimanager.&lt;BR /&gt;It can send only 1 to 1 mapping tag per condition under the authz rule.&lt;BR /&gt;Any ideas ??&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 25 Nov 2022 20:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4728259#M578507</guid>
      <dc:creator>Nick Mavrou</dc:creator>
      <dc:date>2022-11-25T20:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE , Fortimanager, MS Intune</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4731203#M578596</link>
      <description>&lt;P&gt;Integrate FortiManager with ISE via pxGrid.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 20:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-fortimanager-ms-intune/m-p/4731203#M578596</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-12-01T20:33:13Z</dc:date>
    </item>
  </channel>
</rss>

