<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD prob incorrect data in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5065439#M588669</link>
    <description>&lt;P&gt;Do you have the need for the AD probe?&amp;nbsp; Why is it enabled to start with?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Apr 2024 20:03:13 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2024-04-10T20:03:13Z</dc:date>
    <item>
      <title>AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5064942#M588668</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have ISE 3.1.0.518 patch 8. I have a problem that ISE is not fetching the correct attribute information for MacOS. My Macs are not joined to my Windows domain, but ISE finds AD attributes for my Mac but completely wrong. They detect that it is a Windows with another host name. I deleted the Endpoint Mac and bad data comes back. How to fix this?&lt;/P&gt;&lt;P&gt;Endpoint Profile: Apple-Device&lt;/P&gt;&lt;P&gt;AD-Operating System: Windows 10&lt;/P&gt;&lt;P&gt;AD-Fetch-Host-Name: wrong host name&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 15:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5064942#M588668</guid>
      <dc:creator>Sebastien Lagueux</dc:creator>
      <dc:date>2024-04-10T15:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5065439#M588669</link>
      <description>&lt;P&gt;Do you have the need for the AD probe?&amp;nbsp; Why is it enabled to start with?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 20:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5065439#M588669</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-10T20:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066359#M588681</link>
      <description>&lt;P&gt;The AD prod is activated to be able to make rules depending on which group or OU a computer finds itself in.&lt;BR /&gt;But I think I found my problem. ISE relies on reverse DNS entry, and I notice that I have a problem at this level. My PTR entries do not match the DNS entries.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 13:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066359#M588681</guid>
      <dc:creator>Sebastien Lagueux</dc:creator>
      <dc:date>2024-04-11T13:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066369#M588683</link>
      <description>&lt;P&gt;Yeah without properly functioning reverse records you will see issues like this with the AD probe.&amp;nbsp; I would argue active authentication based on machine certificates and looking up OU based on the derived machine name from the certificate is a much better approach for checking group/OU membership than relying on the AD probe.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 13:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066369#M588683</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-11T13:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066371#M588684</link>
      <description>&lt;P&gt;Interesting, I'll look into that. Do you happen to have any documentation on this? I'm quite new to ISE. Thanks for your help&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 13:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066371#M588684</guid>
      <dc:creator>Sebastien Lagueux</dc:creator>
      <dc:date>2024-04-11T13:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: AD prob incorrect data</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066374#M588685</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html#toc-hId-133117567" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html#toc-hId-133117567&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I would also suggest going through some ISE training to learn about authorization policy logic, etc.&amp;nbsp; I would also suggest working with your Cisco Account SE and your preferred Cisco Partner of choice to also help with ISE deployment and policy creation.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 13:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-prob-incorrect-data/m-p/5066374#M588685</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-11T13:28:06Z</dc:date>
    </item>
  </channel>
</rss>

