<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Passive Identity in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780616#M580017</link>
    <description>&lt;P&gt;Trying to get this setup and it appears to be successful when I setup the DC's and configure them.&amp;nbsp; This is for FMC in the background to identify users/devices.&amp;nbsp; However, in the dashboard the provider always shows down.&amp;nbsp; After a lot of research it appears due to a number of Microsoft changes the DC's no longer allow this WMI connectivity.&amp;nbsp; I found a number of posts regarding un-installing a patch or putting in a reg key to fix it but it appears that was sunset as well in early/mid 2022.&amp;nbsp; I attempted to deploy the agents as well and those appear to have been successful but it still doesn't appear to work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whole goal here is to let FMC/FTD be able to identify users from AD.&amp;nbsp; Works just fine if the user actually authenticated to ISE (dot1x, etc) but if the user is just an AD user logging into a machine and that machine simply logs into the domain and never authenticates to ISE, the mapping in ISE never happens and thus FMC/FTD never learns anything about the device.&lt;BR /&gt;&lt;BR /&gt;Is there anyway to get this working now?&amp;nbsp; I've used the downloadable user agent in the past but according to documentation its being EOL'd too.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Feb 2023 14:43:40 GMT</pubDate>
    <dc:creator>stamperbrian</dc:creator>
    <dc:date>2023-02-22T14:43:40Z</dc:date>
    <item>
      <title>ISE Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780616#M580017</link>
      <description>&lt;P&gt;Trying to get this setup and it appears to be successful when I setup the DC's and configure them.&amp;nbsp; This is for FMC in the background to identify users/devices.&amp;nbsp; However, in the dashboard the provider always shows down.&amp;nbsp; After a lot of research it appears due to a number of Microsoft changes the DC's no longer allow this WMI connectivity.&amp;nbsp; I found a number of posts regarding un-installing a patch or putting in a reg key to fix it but it appears that was sunset as well in early/mid 2022.&amp;nbsp; I attempted to deploy the agents as well and those appear to have been successful but it still doesn't appear to work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whole goal here is to let FMC/FTD be able to identify users from AD.&amp;nbsp; Works just fine if the user actually authenticated to ISE (dot1x, etc) but if the user is just an AD user logging into a machine and that machine simply logs into the domain and never authenticates to ISE, the mapping in ISE never happens and thus FMC/FTD never learns anything about the device.&lt;BR /&gt;&lt;BR /&gt;Is there anyway to get this working now?&amp;nbsp; I've used the downloadable user agent in the past but according to documentation its being EOL'd too.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 14:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780616#M580017</guid>
      <dc:creator>stamperbrian</dc:creator>
      <dc:date>2023-02-22T14:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780661#M580020</link>
      <description>&lt;P&gt;Don't use the WMI-based Passive ID Agent, use the newer EVT-based agent.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216512-configure-evt-based-identity-services-en.html" target="_self"&gt;Configure EVT-Based Identity Services Engine Passive ID Agent&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 15:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780661#M580020</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2023-02-22T15:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780743#M580026</link>
      <description>&lt;P&gt;This was it.&amp;nbsp; I had already deployed the agents but hadn't added the DCs using the agents!&amp;nbsp; Story of my life.&amp;nbsp; One step short of my goal &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&amp;nbsp; Thank you so much!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 16:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-identity/m-p/4780743#M580026</guid>
      <dc:creator>stamperbrian</dc:creator>
      <dc:date>2023-02-22T16:50:12Z</dc:date>
    </item>
  </channel>
</rss>

