<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Secure Desktop on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325441#M1122451</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1300719"&gt;@ronnie.shih&lt;/a&gt;&amp;nbsp;nothing specific to FTD - DAP with hostscan continues to be the only options there.&lt;/P&gt;
&lt;P&gt;If you offload posture to Cisco ISE, it can handle the function (and much more) as part of the Authorization conditions and associated results.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 02:17:31 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2025-08-29T02:17:31Z</dc:date>
    <item>
      <title>Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269524#M1119969</link>
      <description>&lt;P&gt;Afternoon,&lt;/P&gt;
&lt;P&gt;When browsing to the public IP of the FTD managed by FMC, I am being&amp;nbsp; directed to&amp;nbsp;/CACHE/sdesktop/install/start.html and presented with a Cisco Secure Desktop page.&amp;nbsp; Does anyone know this can be disabled and why it is being presented?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 14:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269524#M1119969</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T14:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269539#M1119972</link>
      <description>&lt;P&gt;Looks like you have AnyConnect VPN enabled, you can disable that portal using FlexConfig:&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvp81746" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvp81746&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 14:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269539#M1119972</guid>
      <dc:creator>rschlayer</dc:creator>
      <dc:date>2025-03-10T14:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269562#M1119976</link>
      <description>&lt;P&gt;Thanks, but that would not help if you still wanted to provide access to the web portal to download anyconnect.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 15:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269562#M1119976</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T15:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269566#M1119978</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1536974"&gt;@andypowernet85&lt;/a&gt; please see this bugID: &lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwi63184?rfs=qvred" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwi63184?rfs=qvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Basically, you need to add a Flexconfig to specify "without-csd" in your tunnel-group (aka connection profile)&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 15:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269566#M1119978</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-03-10T15:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269595#M1119979</link>
      <description>&lt;P&gt;Thanks for the info! That would be under both defaultwebvpn and the specific RA connection profile?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 16:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269595#M1119979</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T16:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269750#M1119984</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1536974"&gt;@andypowernet85&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If they are exposed via your VPN configuration, yes.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 03:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269750#M1119984</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-03-11T03:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325266#M1122447</link>
      <description>&lt;P&gt;I am facing this same issue, except, we have dynamic access policy for endpoint posture scan enabled.&amp;nbsp; Our security team flagged and hunted after me saying "why are our FTDs showing this cisco secure desktop page?" and is there anyway to disable it?&amp;nbsp; I configured a group-url, inserted "without-csd" flag under webvpn along with a keepout message.&amp;nbsp; Cisco secure desktop page now does not show, but at the same time, posture scan is no longer happening.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is there a way to make dynamic access policy with posture scan work without showing the cisco secure desktop page when browsing to the vpn access URL of the FTD?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 14:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325266#M1122447</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2025-08-28T14:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325294#M1122448</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1300719"&gt;@ronnie.shih&lt;/a&gt;&amp;nbsp;unfortunately, no. Enabling DAP with posture scanning means you will see the CSD page, even though that feature is not in use. I doubt this will ever change since it is mostly a legacy feature and not being actively developed/enhanced.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 15:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325294#M1122448</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-08-28T15:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325436#M1122450</link>
      <description>&lt;P&gt;Is there such a thing as a new posture scan option in FTD for endpoints vpn-in?&amp;nbsp; Or is DAP with hostscan package still the only option?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 01:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325436#M1122450</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2025-08-29T01:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325441#M1122451</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1300719"&gt;@ronnie.shih&lt;/a&gt;&amp;nbsp;nothing specific to FTD - DAP with hostscan continues to be the only options there.&lt;/P&gt;
&lt;P&gt;If you offload posture to Cisco ISE, it can handle the function (and much more) as part of the Authorization conditions and associated results.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 02:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325441#M1122451</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-08-29T02:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5343090#M1123317</link>
      <description>&lt;P&gt;We are implementing SAML. My understanding is that it will then bypass DAP on Cisco and use whatever CAP you have defined in Entra.&amp;nbsp; Would we then remove HostScan and be able to use Flexconfig to shutdown CSD?&amp;nbsp; We found that portal-access-rule 1 deny also blocked SAML, because it blocked the the successful connection pop-up window.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 13:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5343090#M1123317</guid>
      <dc:creator>kcavanagh</dc:creator>
      <dc:date>2025-10-29T13:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370326#M1124472</link>
      <description>&lt;P&gt;Hi Marvin,&lt;BR /&gt;&lt;BR /&gt;The bug to fix ASA/FTD side is&amp;nbsp;CSCwk74566. It is now fixed on ASA, pending fixed FTD release.&lt;BR /&gt;&lt;BR /&gt;The&amp;nbsp;CSCwi63184 is for fixing the CSC side, but that is not related to the browser access.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370326#M1124472</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-16T13:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370334#M1124473</link>
      <description>&lt;P&gt;Are you referring to the CSD page being displayed while DAP is enabled?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370334#M1124473</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-16T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370380#M1124476</link>
      <description>&lt;P&gt;Hi Ronnie,&lt;BR /&gt;&lt;BR /&gt;That is correct. To clarify:&lt;BR /&gt;DAP is configured, connecting to an ASA DefaultWebvpnGroup with a browser. "Without-csd" is NOT configured.&lt;/P&gt;
&lt;P&gt;0. User is asked to authenticate.&lt;BR /&gt;1a. Without fix - browser is redirected to CSD install page, which doesn't work.&lt;/P&gt;
&lt;P&gt;1b. With fix - browser is redirected to CSC download page.&lt;BR /&gt;&lt;BR /&gt;A fixed FTD version is not yet there.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 15:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370380#M1124476</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-16T15:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370386#M1124477</link>
      <description>&lt;P&gt;Thank you very much.&amp;nbsp; Can you please update when a fix is available for the FTD and what version of upgrade to?&amp;nbsp; Security team literally gave me a hard time on this for months, even getting our Cisco reps + a Cisco engineer on a group call simply to justify making an exemption for this issue in the Wiz scanner.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 16:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370386#M1124477</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-16T16:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370610#M1124484</link>
      <description>&lt;P&gt;This should be fixed in next MRs for FTD. Tentatively planned between end of April and end of June 2026, depending on version.&lt;BR /&gt;Please subscribe to bug notifications to get notified when a fixed version is released.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 12:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370610#M1124484</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-17T12:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5371590#M1124534</link>
      <description>&lt;P&gt;I just noticed FTD v7.2.11-313 got released on 2/11 and we are running on the 7.2x series.&amp;nbsp; Does v7.2.11-313 fix this issue?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 18:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5371590#M1124534</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-20T18:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5372269#M1124566</link>
      <description>&lt;P&gt;You should be able to use flexconfig with the "&lt;SPAN class="qtr-margin-top"&gt;portal-access-rule&lt;/SPAN&gt;" as of 7.2.11.&lt;/P&gt;
&lt;P&gt;It fixes this bug:&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk14657" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk14657&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/release-notes/threat-defense/720/threat-defense-release-notes-72.html#resolved-bugs-72eleven0" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/release-notes/threat-defense/720/threat-defense-release-notes-72.html#resolved-bugs-72eleven0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 15:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5372269#M1124566</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2026-02-24T15:16:53Z</dc:date>
    </item>
  </channel>
</rss>

