<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enable anomalous behavior enforcement on ISE 3.1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5121601#M589746</link>
    <description>&lt;P&gt;Not sure if this is your problem, but it's not uncommon for older ISE releases to have bugs - ISE 3.1 is getting a bit "old" already. Might be worth upgrading.&amp;nbsp; Have a look through the ISE Dashboard (click on Anomalous counter) to see if you can spot the reason why the endpoint was flagged as Anomalous. I doesn't tell you there and then - might need to dig around the Operations Reports too. Operations &amp;gt; Reports &amp;gt; Endpoints and Users &amp;gt; Profiled Endpoint Summary&lt;/P&gt;
&lt;P&gt;Locate the MAC address there and click on "Raw Log"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 04:56:21 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-05-31T04:56:21Z</dc:date>
    <item>
      <title>Enable anomalous behavior enforcement on ISE 3.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5090417#M589265</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;
&lt;P&gt;We use ISE 3.1 P6&lt;/P&gt;
&lt;P&gt;we notice there are some anomalous behavior endpoints increase day by day.&lt;/P&gt;
&lt;P&gt;There are some endpoint not connected long time, some PCs hit Default policy, some PCs are status connecting including MAB profiling.&lt;/P&gt;
&lt;P&gt;Is there any impact with ISE performance and current PCs and all MAB profiling if enable feature Enforcement?&lt;/P&gt;
&lt;P&gt;Kindly share goof practice and recommend to enhance more visibility and under managed from ISE.&lt;/P&gt;
&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 11:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5090417#M589265</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2024-05-06T11:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: Enable anomalous behavior enforcement on ISE 3.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5091895#M589277</link>
      <description>&lt;P&gt;I would not enable Anomaly Enforcement until I knew exactly that these are not false positives. I have never used this feature and quite frankly, I don't see it being very useful, since ISE doesn't give us any nerd knobs to tune the logic of what is considered to be "anomalous". It's not flexible. When I see counters increasing, I always try to find the reason WHY.&amp;nbsp; And so far I have never had that "ah ha" moment where I realise there is a problem in the network. In my experience so far, ISE doesn't tell you anything useful - it will say that a profile changed from Windows 10 to Windows 10. Yeah right - thanks.&lt;/P&gt;
&lt;P&gt;The only time I have seen anomaly detection catch a real anomaly, was with one brand of desk phone, that for some stupid reason, executed DHCP twice during boot up. First time around, it boots up as a Linux OS, and then once it's semi-booted up, another IP stack initialises, and presents itself as an MSFT (Microsoft) - but this is expected normal for this vendor product.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you looked into any of your own anomalies so far, and if so, what have you found?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 22:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5091895#M589277</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-06T22:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Enable anomalous behavior enforcement on ISE 3.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5121597#M589745</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;We tried workaround by remove some offline endpoint like printer from context visibility.&lt;/P&gt;&lt;P&gt;Next few days it will come back flag as Anomalous Behavior. That printer we created as profiling based on OUI mac address.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 04:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5121597#M589745</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2024-05-31T04:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Enable anomalous behavior enforcement on ISE 3.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5121601#M589746</link>
      <description>&lt;P&gt;Not sure if this is your problem, but it's not uncommon for older ISE releases to have bugs - ISE 3.1 is getting a bit "old" already. Might be worth upgrading.&amp;nbsp; Have a look through the ISE Dashboard (click on Anomalous counter) to see if you can spot the reason why the endpoint was flagged as Anomalous. I doesn't tell you there and then - might need to dig around the Operations Reports too. Operations &amp;gt; Reports &amp;gt; Endpoints and Users &amp;gt; Profiled Endpoint Summary&lt;/P&gt;
&lt;P&gt;Locate the MAC address there and click on "Raw Log"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 04:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-anomalous-behavior-enforcement-on-ise-3-1/m-p/5121601#M589746</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-31T04:56:21Z</dc:date>
    </item>
  </channel>
</rss>

