Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I am trying to create an access policy for just mobile devices, that will block certain content categories that are different from macOS/Windows devices. I have the macOS/Windows policies such as our global allow and global block applied to just thos...
I am attempting to add Secure Endpoint (AMP) with our MDM, Mosyle, all the mobile devices are iPhones. I have the Cisco Security Connector downloaded to test devices with the MDM. In Secure Endpoint, I select Management > Deploy Clarity for iOS > sel...
We put a machine in a custom policy, that uses a blacklist to blocks all internal IPs. We are using VPN 5.1.4.74 and endpoint 8.4.2.30317 on a windows 10 machine. The IP blacklist includes our FTDs, and ISE servers. We are still able to access the IP...
Is it possible to put a machine in isolation, to keep it off our internal network, but still allow the machine to access the internet? I have built an IP Block List with our internal IPs, but we would want our end users to be able to access the inter...
Our secure endpoint is really heavy on performance during full scans. This is on servers and end user's machines. What can we do to have less of an impact on the end user experience, while still getting our required full scans in? We are looking for ...
I am having the same issue with supervised iPhones.... We are using a different MDM, Mosyle, and having the exact issue that you are. Did you get this figured out?
Hi Chris,Thanks for replying. Yes, we do have them in Apple Business Manager, as well as the MDM. I confirmed via the business phone that it is supervised . Since you do have a successful deployment, could I ask how you got the profile added? Did you...
Hi Ken,Yep we are working with a full Cisco stack. We were trying to keep it inside of Secure Endpoint, but the DAP policy has come up in our talks. Our leadership is wanting to see if it can be done in Secure Endpoint, but if not we can scratch that...