03-10-2025 07:01 AM
Afternoon,
When browsing to the public IP of the FTD managed by FMC, I am being directed to /CACHE/sdesktop/install/start.html and presented with a Cisco Secure Desktop page. Does anyone know this can be disabled and why it is being presented?
Regards,
04-22-2026 07:06 AM
@ronnie.shih you can expect the update to be rolled up in 10.1.0 ca. July this year.
7.7. might not get updated since it is now past-EoS. https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw/ftd-ftdv-7-7-fmc-fmcv-7-7-fxos-2-17-eol.html
04-22-2026 07:27 AM
That link shows product affected as: Threat Defense software 7.7 for 1200 Series Firewall. But we run threat defense virtual in Azure. Is it still end of life?
04-22-2026 07:41 AM
I believe that information in table 2 of the announcement is incorrect.
7.7 is end of sales no matter what platform (not "end of life" yet - it will continue to be supported until September 2028)
08-28-2025 07:29 AM
I am facing this same issue, except, we have dynamic access policy for endpoint posture scan enabled. Our security team flagged and hunted after me saying "why are our FTDs showing this cisco secure desktop page?" and is there anyway to disable it? I configured a group-url, inserted "without-csd" flag under webvpn along with a keepout message. Cisco secure desktop page now does not show, but at the same time, posture scan is no longer happening.
So is there a way to make dynamic access policy with posture scan work without showing the cisco secure desktop page when browsing to the vpn access URL of the FTD?
08-28-2025 08:11 AM
@ronnie.shih unfortunately, no. Enabling DAP with posture scanning means you will see the CSD page, even though that feature is not in use. I doubt this will ever change since it is mostly a legacy feature and not being actively developed/enhanced.
08-28-2025 06:27 PM
Is there such a thing as a new posture scan option in FTD for endpoints vpn-in? Or is DAP with hostscan package still the only option?
08-28-2025 07:17 PM
@ronnie.shih nothing specific to FTD - DAP with hostscan continues to be the only options there.
If you offload posture to Cisco ISE, it can handle the function (and much more) as part of the Authorization conditions and associated results.
10-29-2025 06:04 AM
We are implementing SAML. My understanding is that it will then bypass DAP on Cisco and use whatever CAP you have defined in Entra. Would we then remove HostScan and be able to use Flexconfig to shutdown CSD? We found that portal-access-rule 1 deny also blocked SAML, because it blocked the the successful connection pop-up window.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide