<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Secure Desktop on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5551135#M1125152</link>
    <description>&lt;P&gt;Version 7.7 is still maintained. Next 7.7 Maintenance Release (MR) is planned for beginning of July.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="6"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;STRONG&gt;End of SW Maintenance Releases Date:&lt;BR /&gt;App SW&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The last date that Cisco Engineering may release any final software maintenance releases or bug fixes. After this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;STRONG&gt;September 29, 2027&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2026 06:39:41 GMT</pubDate>
    <dc:creator>mgrzesia</dc:creator>
    <dc:date>2026-05-07T06:39:41Z</dc:date>
    <item>
      <title>Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269524#M1119969</link>
      <description>&lt;P&gt;Afternoon,&lt;/P&gt;
&lt;P&gt;When browsing to the public IP of the FTD managed by FMC, I am being&amp;nbsp; directed to&amp;nbsp;/CACHE/sdesktop/install/start.html and presented with a Cisco Secure Desktop page.&amp;nbsp; Does anyone know this can be disabled and why it is being presented?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 14:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269524#M1119969</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T14:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269539#M1119972</link>
      <description>&lt;P&gt;Looks like you have AnyConnect VPN enabled, you can disable that portal using FlexConfig:&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvp81746" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvp81746&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 14:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269539#M1119972</guid>
      <dc:creator>rschlayer</dc:creator>
      <dc:date>2025-03-10T14:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269562#M1119976</link>
      <description>&lt;P&gt;Thanks, but that would not help if you still wanted to provide access to the web portal to download anyconnect.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 15:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269562#M1119976</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T15:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269566#M1119978</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1536974"&gt;@andypowernet85&lt;/a&gt; please see this bugID: &lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwi63184?rfs=qvred" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwi63184?rfs=qvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Basically, you need to add a Flexconfig to specify "without-csd" in your tunnel-group (aka connection profile)&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 15:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269566#M1119978</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-03-10T15:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269595#M1119979</link>
      <description>&lt;P&gt;Thanks for the info! That would be under both defaultwebvpn and the specific RA connection profile?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 16:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269595#M1119979</guid>
      <dc:creator>andypowernet85</dc:creator>
      <dc:date>2025-03-10T16:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269750#M1119984</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1536974"&gt;@andypowernet85&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If they are exposed via your VPN configuration, yes.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 03:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5269750#M1119984</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-03-11T03:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325266#M1122447</link>
      <description>&lt;P&gt;I am facing this same issue, except, we have dynamic access policy for endpoint posture scan enabled.&amp;nbsp; Our security team flagged and hunted after me saying "why are our FTDs showing this cisco secure desktop page?" and is there anyway to disable it?&amp;nbsp; I configured a group-url, inserted "without-csd" flag under webvpn along with a keepout message.&amp;nbsp; Cisco secure desktop page now does not show, but at the same time, posture scan is no longer happening.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is there a way to make dynamic access policy with posture scan work without showing the cisco secure desktop page when browsing to the vpn access URL of the FTD?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 14:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325266#M1122447</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2025-08-28T14:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325294#M1122448</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1300719"&gt;@ronnie.shih&lt;/a&gt;&amp;nbsp;unfortunately, no. Enabling DAP with posture scanning means you will see the CSD page, even though that feature is not in use. I doubt this will ever change since it is mostly a legacy feature and not being actively developed/enhanced.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 15:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325294#M1122448</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-08-28T15:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325436#M1122450</link>
      <description>&lt;P&gt;Is there such a thing as a new posture scan option in FTD for endpoints vpn-in?&amp;nbsp; Or is DAP with hostscan package still the only option?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 01:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325436#M1122450</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2025-08-29T01:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325441#M1122451</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1300719"&gt;@ronnie.shih&lt;/a&gt;&amp;nbsp;nothing specific to FTD - DAP with hostscan continues to be the only options there.&lt;/P&gt;
&lt;P&gt;If you offload posture to Cisco ISE, it can handle the function (and much more) as part of the Authorization conditions and associated results.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 02:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5325441#M1122451</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-08-29T02:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5343090#M1123317</link>
      <description>&lt;P&gt;We are implementing SAML. My understanding is that it will then bypass DAP on Cisco and use whatever CAP you have defined in Entra.&amp;nbsp; Would we then remove HostScan and be able to use Flexconfig to shutdown CSD?&amp;nbsp; We found that portal-access-rule 1 deny also blocked SAML, because it blocked the the successful connection pop-up window.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 13:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5343090#M1123317</guid>
      <dc:creator>kcavanagh</dc:creator>
      <dc:date>2025-10-29T13:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370326#M1124472</link>
      <description>&lt;P&gt;Hi Marvin,&lt;BR /&gt;&lt;BR /&gt;The bug to fix ASA/FTD side is&amp;nbsp;CSCwk74566. It is now fixed on ASA, pending fixed FTD release.&lt;BR /&gt;&lt;BR /&gt;The&amp;nbsp;CSCwi63184 is for fixing the CSC side, but that is not related to the browser access.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370326#M1124472</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-16T13:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370334#M1124473</link>
      <description>&lt;P&gt;Are you referring to the CSD page being displayed while DAP is enabled?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370334#M1124473</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-16T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370380#M1124476</link>
      <description>&lt;P&gt;Hi Ronnie,&lt;BR /&gt;&lt;BR /&gt;That is correct. To clarify:&lt;BR /&gt;DAP is configured, connecting to an ASA DefaultWebvpnGroup with a browser. "Without-csd" is NOT configured.&lt;/P&gt;
&lt;P&gt;0. User is asked to authenticate.&lt;BR /&gt;1a. Without fix - browser is redirected to CSD install page, which doesn't work.&lt;/P&gt;
&lt;P&gt;1b. With fix - browser is redirected to CSC download page.&lt;BR /&gt;&lt;BR /&gt;A fixed FTD version is not yet there.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 15:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370380#M1124476</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-16T15:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370386#M1124477</link>
      <description>&lt;P&gt;Thank you very much.&amp;nbsp; Can you please update when a fix is available for the FTD and what version of upgrade to?&amp;nbsp; Security team literally gave me a hard time on this for months, even getting our Cisco reps + a Cisco engineer on a group call simply to justify making an exemption for this issue in the Wiz scanner.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 16:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370386#M1124477</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-16T16:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370610#M1124484</link>
      <description>&lt;P&gt;This should be fixed in next MRs for FTD. Tentatively planned between end of April and end of June 2026, depending on version.&lt;BR /&gt;Please subscribe to bug notifications to get notified when a fixed version is released.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 12:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5370610#M1124484</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-17T12:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5371590#M1124534</link>
      <description>&lt;P&gt;I just noticed FTD v7.2.11-313 got released on 2/11 and we are running on the 7.2x series.&amp;nbsp; Does v7.2.11-313 fix this issue?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 18:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5371590#M1124534</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-02-20T18:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5372269#M1124566</link>
      <description>&lt;P&gt;You should be able to use flexconfig with the "&lt;SPAN class="qtr-margin-top"&gt;portal-access-rule&lt;/SPAN&gt;" as of 7.2.11.&lt;/P&gt;
&lt;P&gt;It fixes this bug:&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk14657" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk14657&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/release-notes/threat-defense/720/threat-defense-release-notes-72.html#resolved-bugs-72eleven0" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/release-notes/threat-defense/720/threat-defense-release-notes-72.html#resolved-bugs-72eleven0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 15:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5372269#M1124566</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2026-02-24T15:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5547242#M1125034</link>
      <description>&lt;P&gt;The fixed FTD 7.4.7 is now available.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 06:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5547242#M1125034</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-04-22T06:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Desktop on FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5547325#M1125039</link>
      <description>&lt;P&gt;We've upgraded to v7.7.11 a while back to support geo blocking on the external interface.&amp;nbsp; Guess we are out of luck again on this one since we can't go backwards to 7.4.7&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 12:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-desktop-on-ftd/m-p/5547325#M1125039</guid>
      <dc:creator>ronnie.shih</dc:creator>
      <dc:date>2026-04-22T12:25:33Z</dc:date>
    </item>
  </channel>
</rss>

