02-07-2017 09:33 PM
Hi Team,
We are working on a ISE feature sheet and need clarity on below features:
Appreciate quick reply on this
Thanks & Regards,
Yogesh Madhekar
Solved! Go to Solution.
02-09-2017 12:43 PM
The features in your first bullet are switch & switchport functions. ISE authenticates and authorizes endpoints using the Layer 2, 802.1X protocol. We can potentially handle MAC spoofing with the new Ability to Detect Anomalous Behavior of Endpoints.
I don't know how you define "a full system scan" but we support the OESIS set of AV/AS systems as well as registry checks, USB and other things. We have a Periodic Reassessment (PRA) if that's what you mean by "real time protection".
02-09-2017 12:43 PM
The features in your first bullet are switch & switchport functions. ISE authenticates and authorizes endpoints using the Layer 2, 802.1X protocol. We can potentially handle MAC spoofing with the new Ability to Detect Anomalous Behavior of Endpoints.
I don't know how you define "a full system scan" but we support the OESIS set of AV/AS systems as well as registry checks, USB and other things. We have a Periodic Reassessment (PRA) if that's what you mean by "real time protection".
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide