01-28-2025 07:39 AM
Hello, I am currently running ISE 3.2 Patch 7 and for several versions now I am seeing alarms for "The ISE machine account does not have the required privileges to fetch groups". I have performed the steps as advised by TAC to resolve the issue, but I am still seeing these alarms and curious if there are others who are seeing the same alarms and maybe its a cosmetic thing. I have not actually had any complaints of problems and I can run the tests to Check AD groups which appears to be working as expected yet I continue to see these alarms. Anyone else?
Regards,
Henry
01-28-2025 08:04 AM
Wow.... I just opened a TAC case on Monday because of this. I'm on ISE v3.0 and just patched it to patch 8 last week. TAC is reviewing the support bundle they requested. The only complaints I have recieved is with TACACS and folks not able to run commands and then it starts working, but that might be a separate issue. Hopefully today they will respond back with something.
01-28-2025 08:10 AM
01-28-2025 08:17 AM
That is what I'm hearing right now. I patched last week but only some engineers have reached out to me.
01-28-2025 08:47 AM
TAC told me to review the account being used with the AD team. Thats what I'm going to do today, but here is what they provided:
ISE machine account that communicates to the Active Directory connection requires the following permissions:
-Change password
-Read the user and machine objects corresponding to users and machines that are authenticated
-Query Active Directory to get information (for example, trusted domains, alternative UPN suffixes, and so on)
-Read the tokenGroups attribute
You can pre-create the machine account in Active Directory. If the SAM name matches the Cisco ISE appliance hostname, it is located during the join operation and re-used.
The following link provides additional information: https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html
01-28-2025 09:41 AM
@henry.astorga check the account that you are using to join the domain. For me its failing stating password has expired. I used the AD test and put in the account I used to join ISE to AD and the output was password failed.
01-28-2025 11:30 AM
01-28-2025 11:43 AM
Well my issue was the account password expired so I had to have them reset it for me. Just fixed it a few minutes ago but hopefully I will not see any of these alerts.
01-31-2025 08:43 AM
@henry.astorga any update. I started to see this alert again but not as much as I did before. TAC is still investigating but can't seem to identify which node is sending the alert.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide