<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine Authentication vs Posture Assesment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330146#M598175</link>
    <description>&lt;P&gt;In addition to what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mentioned, using machine certificate authentication is a secure way to ensure that the machine belongs to your corporate. Although you might run similar checks via posture assessment, however, the big difference between the two that I see is that impersonating or stealing the machine certificate is less likely to happen. On the other side replicating the conditions you have on the posture assessment checks could potentially be something easy to achieve.&lt;/P&gt;</description>
    <pubDate>Mon, 15 Sep 2025 10:39:39 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2025-09-15T10:39:39Z</dc:date>
    <item>
      <title>Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330085#M598168</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Hi All,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have been looking into the exact difference between machine authentication and posture assessment. If I perform a posture assessment on a machine before it joins the network—such as checking whether it is a corporate device, AD domain-joined, or passes other health checks—what is the benefit of also having machine authentication?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 07:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330085#M598168</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-09-15T07:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330086#M598169</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1753581"&gt;@henokk60&lt;/a&gt;&amp;nbsp;machine authentication, checks the machine credentials (AD computer account or certificate) is valid. Posture assessment checks the computer is compliant with posture policy, i.e., is Anti-Virus/Malware installed and up to date or are Windows patches installed or registry checks etc. Posture assessment is run for logged in users, not during machine authentication.&lt;/P&gt;
&lt;P&gt;The benefit of running machine authentication is machine group policies can be applied or any pre-user login tasks.&lt;/P&gt;
&lt;P&gt;Using TEAP (machine and user authentication) is now good enough to confirm a corporate device without necessarily running posture assessment.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 07:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330086#M598169</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-09-15T07:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330094#M598170</link>
      <description>&lt;P&gt;Answer for your Q&lt;/P&gt;
&lt;P&gt;AD join as posture compliant is not available as I know.&lt;/P&gt;
&lt;P&gt;So only way to check machine with AD is use machine authc.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 07:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330094#M598170</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-15T07:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330133#M598173</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Yes you can do that by using the &lt;EM&gt;&lt;STRONG&gt;registry condition list&lt;/STRONG&gt;&lt;/EM&gt; to check for specific domain and we already achieve that.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 09:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330133#M598173</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-09-15T09:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330146#M598175</link>
      <description>&lt;P&gt;In addition to what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mentioned, using machine certificate authentication is a secure way to ensure that the machine belongs to your corporate. Although you might run similar checks via posture assessment, however, the big difference between the two that I see is that impersonating or stealing the machine certificate is less likely to happen. On the other side replicating the conditions you have on the posture assessment checks could potentially be something easy to achieve.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 10:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330146#M598175</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-09-15T10:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication vs Posture Assesment</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330147#M598176</link>
      <description>&lt;P&gt;Register not meaning that device connect AD to check if it valid or not&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 10:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-vs-posture-assesment/m-p/5330147#M598176</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-15T10:41:28Z</dc:date>
    </item>
  </channel>
</rss>

