<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Posture checking on Cisco Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265606#M1119814</link>
    <description>&lt;P&gt;I don't believe you can use DAP to check for "ANY" AV (or AntiMalware as they call it). The OWASP telemetry reports which product(s) are installed but the DAP logic cannot check for that.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Feb 2025 16:05:15 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2025-02-27T16:05:15Z</dc:date>
    <item>
      <title>Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265162#M1119799</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I would like to implement some "posture" checking on our FTD firewall managed in cdFMC, I want to ensure all remote access vpn clients have some sort of AntiVirus running on there pc's etc.&lt;/P&gt;&lt;P&gt;On the ASA this could be done with hostscan.&lt;/P&gt;&lt;P&gt;What are the requirements for doing these checks? do I need ISE? what licences would I need? and can anyconnect handle this? cheers&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 16:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265162#M1119799</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-02-26T16:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265163#M1119800</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320506"&gt;@carl_townshend&lt;/a&gt; you can use Dynamic Acces Policies (DAP) on the FTD, you do not require ISE. You require Secure Client/AnyConnect licenses and the relevant module installed.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/cluster/ftd_dap_usecases.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/cluster/ftd_dap_usecases.html&lt;/A&gt;&lt;/P&gt;
&lt;H2 id="ariaid-title6" class="title topictitle2"&gt;Licensing for Dynamic Access Policies&lt;/H2&gt;
&lt;DIV class="body refbody"&gt;
&lt;SECTION id="reference_pxp_m3g_k4b__section_jc3_lhg_k4b" class="section"&gt;
&lt;P class="p"&gt;The &lt;SPAN class="ph"&gt;threat defense&lt;/SPAN&gt; must have one of the AnyConnect licenses that supports remote access VPN:&lt;/P&gt;
&lt;UL id="reference_pxp_m3g_k4b__ul_kc3_lhg_k4b" class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph"&gt;Secure Client Premier&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph"&gt;Secure Client Advantage&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph"&gt;Secure Client VPN Only&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;The &lt;SPAN class="ph"&gt;management center&lt;/SPAN&gt; must have export-controlled features enabled.&lt;/P&gt;
&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 26 Feb 2025 16:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265163#M1119800</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-26T16:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265175#M1119804</link>
      <description>&lt;P&gt;I would add that posture checking using DAP leverages the "Secure Firewall Posture" hidden module of Secure Client. So make sure your policy is set to install that module as it is responsible for querying the endpoint and replying the the FTD regarding the various posture conditions your have configured.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 17:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265175#M1119804</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-02-26T17:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265215#M1119807</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;&lt;P&gt;we already use the dynamic access policies, I’m looking to enable some kind of checking on the client for antivirus.&lt;/P&gt;&lt;P&gt;do I need ISE for this or is it something I can do without ISE and just from the FTD?&lt;/P&gt;&lt;P&gt;if so, where are these settings?&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 19:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265215#M1119807</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-02-26T19:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265271#M1119808</link>
      <description>&lt;P&gt;Personally I would use ISE instead of DAP when doing posture assessments.&amp;nbsp; That being said, you could look into matching on registry keys when looking for Anti-Virus on the host machine.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 23:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265271#M1119808</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-02-26T23:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265532#M1119812</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;So I have got it working to a point, I have the secure posture module installed and have created a DAP policy.&lt;/P&gt;&lt;P&gt;What I want to do is create a policy so that if you dont have "ANY" Antivirus installed, you get kicked off, I cannot see any options to do this.&lt;/P&gt;&lt;P&gt;How would I achieve this with a DAP policy on the FTD please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 13:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265532#M1119812</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-02-27T13:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265606#M1119814</link>
      <description>&lt;P&gt;I don't believe you can use DAP to check for "ANY" AV (or AntiMalware as they call it). The OWASP telemetry reports which product(s) are installed but the DAP logic cannot check for that.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 16:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5265606#M1119814</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-02-27T16:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Posture checking on Cisco Firepower</title>
      <link>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5266842#M1119845</link>
      <description>&lt;P&gt;Hi All&lt;BR /&gt;What is the point of the posture assessment on the firewall if we can not check if something "doesn't" exist?&lt;BR /&gt;As an example, I would like to ensure that when any third party connects to us they have some kind of antivirus installed and if it finds none, then they are terminated. Is this not possible?&lt;/P&gt;&lt;P&gt;If so then am I correct in saying that with posture, you are looking for a specific thing that exists or doesnt exist? this means that If I connect a computer with no AV, it would simply let me connect as I didnt meet the policy above? this sounds counter intuative.&lt;/P&gt;&lt;P&gt;How does everyone else tackle this issue?&lt;/P&gt;&lt;P&gt;What kind of things are best when dealing with untrusted third parties connecting to our VPN?&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 16:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/posture-checking-on-cisco-firepower/m-p/5266842#M1119845</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-03-03T16:07:37Z</dc:date>
    </item>
  </channel>
</rss>

