As a migration from ACS to ISE seems to devour the ISE default policies (meaning - as far as I can tell - that you've got to either clone-and-default or spin up a fresh ISE VM in order to get a copy of them) I've put a copy of them here. The steps below will recreate your out-of-the-box Authorization Policies.
Hopefully someone will find this useful.
Wireless Black List Default
ENABLED
If Endpoint Identity Groups -> Blacklist
AND Select Existing Condition from Library -> Compound Conditions -> Wireless_Access
Then Standard -> Blackhole_Wireless_Access
Profiled Cisco IP Phones
ENABLED
If Endpoint Identity Groups -> Profiled -> Cisco-IP-Phone
Then Standard -> Cisco_IP_Phones
Profiled Non Cisco IP Phones
ENABLED
If Any AND Select Existing Condition from Library -> Compound Conditions -> Non_Cisco_Profiled_Phones
Then Standard -> Non_Cisco_IP_Phones
Compliant_Devices_Access
DISABLED
If Any AND Compound Conditions -> Network_Access_Authentication_Passed
AND Add Condition from Library -> Compound Conditions -> Compliant_Devices
Then Standard -> PermitAccess
Employee_EAP_TLS
DISABLED
If Any AND Select Existing Condition from Library -> Compound Conditions -> Wireless_802.1X
AND Add Condition from Library -> Compound Conditions -> BYOD_is_Registered
AND Add Condition from Library -> Compound Conditions -> EAP-TLS
AND Add Condition from Library -> Compound Conditions -> MAC_in_SAN
Then Standard -> PermitAccess
AND Security Group -> BYOD
Employee_Onboarding
DISABLED
If Any AND Select Existing Condition from Library -> Compound Conditions -> Wireless_802.1X
AND Add Condition from Library -> Compound Conditions -> EAP-MSCHAPv2
Then Standard -> NSP_Onboard
AND Security Group -> BYOD
Wi-Fi_Guest_Access
DISABLED
If Any AND Select Existing Condition from Library -> Compound Conditions -> Guest_Flow
AND Add Condition from Library -> Compound Conditions -> Wireless_MAB
Then Standard -> PermitAccess
AND Security Group -> Guests
Wi-Fi_Redirect_to_Guest_Login
DISABLED
If Any AND Select Existing Condition from Library -> Compound Conditions -> Wireless_MAB
Then Standard -> Cisco_WebAuth
Basic_Authenticated_Access
ENABLED
If Any AND Compound Conditions -> Network_Access_Authentication_Passed
Then Standard -> PermitAccess
Default
ENABLED
If no matches, then Standard -> DenyAccess
If Default has been renamed Basic_Authenticated_Access (it did on ours) you'll need to set it as above, then call your Basic_Authenticated_Access rule something else.
------------
If you've followed Jason Kunst's excellent ISE 2.0 Wireless Guest Setup Guide then you'll also want to do the following if your guest rules have been eaten:-
Enable the above Wi-Fi_Redirect_to_Guest_Login rule
GuestPermit
ENABLED
If Endpoint Identity Groups -> GuestEndpoints
AND Add Condition from Library -> Compound Conditions -> Wireless_MAB
Then Standard -> PermitAccess