<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE posture for Active Directory join in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253091#M594521</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; checking the registry is the primary way to determine if joined to the domain.&lt;/P&gt;
&lt;P&gt;Else, not posture related, but use EAP Chaining (EAP-FAST/TEAP) that would check to see if the computer has a domain issued certificate + user certificate. Typically a computer won't have a certificate unless joined to the domain.&lt;/P&gt;
&lt;P&gt;Or with posture you can check to see whether a specific application (i.e the Corporate installed AV or other software) is installed on a computer.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2025 10:07:07 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-01-27T10:07:07Z</dc:date>
    <item>
      <title>ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253040#M594513</link>
      <description>&lt;P&gt;Other than checking in registry condition, any mechanism to identify whether a windows PC is joined to AD domain?&lt;BR /&gt;ISE version 3.4, secure client 5.1&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 08:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253040#M594513</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2025-01-27T08:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253081#M594519</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; the recommended way to identify a domain joined corporate asset by checking the registry:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Domain&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Value=domain.name is your domain name&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253081#M594519</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-27T10:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253082#M594520</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Other than checking in registry condition??&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 09:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253082#M594520</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2025-01-27T09:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253091#M594521</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; checking the registry is the primary way to determine if joined to the domain.&lt;/P&gt;
&lt;P&gt;Else, not posture related, but use EAP Chaining (EAP-FAST/TEAP) that would check to see if the computer has a domain issued certificate + user certificate. Typically a computer won't have a certificate unless joined to the domain.&lt;/P&gt;
&lt;P&gt;Or with posture you can check to see whether a specific application (i.e the Corporate installed AV or other software) is installed on a computer.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:07:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253091#M594521</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-27T10:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253094#M594522</link>
      <description>&lt;P&gt;There are a few command-line ways to identify the domain.&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;systeminfo | findstr /B "Domain"&lt;/P&gt;
&lt;P&gt;^^- will show "Domain: WORKGROUP" if not in domain&lt;/P&gt;
&lt;P&gt;And:&amp;nbsp;dsregcmd /status&lt;BR /&gt;^^- the first section shows if the computer is AD or AAD joined:&lt;BR /&gt;(see screenshot example)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonatanJonasson_0-1737972491799.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238585i8CBDB7E6E7083C35/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonatanJonasson_0-1737972491799.png" alt="JonatanJonasson_0-1737972491799.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the powershell command:&amp;nbsp;Get-CimInstance win32_computersystem&lt;BR /&gt;^^- will show under the Domain column which domain (if any) the computer is joined.&lt;/P&gt;
&lt;P&gt;There may be other ways as well if you just google for how to check this via powershell.&lt;BR /&gt;And with this info you should be able to craft a .ps1 script for the posture evaluation.&lt;/P&gt;
&lt;P&gt;Just keep in mind that if your company is moving to EntraID(Azure) joined machines, the results will not be the same as when checking for on-premises AD joined.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253094#M594522</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2025-01-27T10:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253099#M594523</link>
      <description>&lt;P&gt;thanks, how to check&amp;nbsp;&lt;SPAN&gt;if the computer has a domain issued certificate + user certificate.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5253099#M594523</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2025-01-27T10:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275313#M595664</link>
      <description>&lt;P&gt;Can this be done for VPN connections?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 12:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275313#M595664</guid>
      <dc:creator>Danny Dulin</dc:creator>
      <dc:date>2025-03-26T12:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275602#M595674</link>
      <description>&lt;P&gt;if you're referring to posture, yes it can be done for Anyconnect VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 04:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275602#M595674</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2025-03-27T04:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275610#M595675</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;run i nthe CMD command&lt;/P&gt;&lt;P&gt;systeminfo | findstr /B /C:"Domain"&lt;/P&gt;&lt;P&gt;wmic computersystem get domain&lt;/P&gt;&lt;P&gt;(Get-WmiObject Win32_ComputerSystem).PartOfDomain&lt;/P&gt;&lt;P&gt;(Get-WmiObject Win32_ComputerSystem).Domain&lt;/P&gt;&lt;P&gt;net config workstation&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;other then that:&lt;/P&gt;&lt;P&gt;Press Win + R, type sysdm.cpl, and press Enter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 06:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275610#M595675</guid>
      <dc:creator>Azizi123</dc:creator>
      <dc:date>2025-03-27T06:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275611#M595676</link>
      <description>&lt;P&gt;thank you &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1860159"&gt;@Azizi123&lt;/a&gt; commands looks helpful, but how to do Posture from ISE with these commands other powershell script.&lt;BR /&gt;Powershell might be disabled in most systems.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 06:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275611#M595676</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2025-03-27T06:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for Active Directory join</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275614#M595677</link>
      <description>&lt;P&gt;Dear manvik:&lt;/P&gt;&lt;P&gt;you'll need to rely on Cisco's built-in agents (like the ISE Posture Agent) for a more automated approach. This agent performs checks on the endpoint's compliance with your ISE security policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Requirements:&lt;/P&gt;&lt;P&gt;You need a Cisco ISE license to use the posture functionality.&lt;/P&gt;&lt;P&gt;Cisco AnyConnect must be licensed, and the Posture module needs to be enabled on the Cisco ISE platform.&lt;/P&gt;&lt;P&gt;How to Get the AnyConnect Client with the Posture Module:&lt;/P&gt;&lt;P&gt;Step 1: Ensure you have a Cisco account and the necessary licensing for Cisco AnyConnect and ISE.&lt;/P&gt;&lt;P&gt;Step 2: Log in to the Cisco Software Download page.&lt;/P&gt;&lt;P&gt;Step 3: Search for Cisco AnyConnect Secure Mobility Client.&lt;/P&gt;&lt;P&gt;Step 4: Choose the version you want to download.&lt;/P&gt;&lt;P&gt;Step 5: Select the Posture module as part of the AnyConnect package during installation. Make sure your Cisco ISE is properly configured to interact with the posture agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 06:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-active-directory-join/m-p/5275614#M595677</guid>
      <dc:creator>Azizi123</dc:creator>
      <dc:date>2025-03-27T06:32:28Z</dc:date>
    </item>
  </channel>
</rss>

