Setting up basic endpoint assessment for AV product and definitions check
What is the maximum number of antivirus products the standard version of endpoint assessment can check for without prolonged delays prior to being granted access?
How much longer does it take to check for 5 or 10 possibilities vs checking for 60 possibilities or adding every AV product the Cisco endpoint assessment supports?
Can you control the order it checks so the most likely and expected AV products for would be quickly found. For instance, if most users would be expected to have McAfee Virusscan Enterprise, Symantec Endpoint Protection or Microsoft Forefront, it should check for those three first and if those were not found, then start checking for other AV products instead of going throuigh a huge list in alphabetical order for every login attempt?
if length of assessment time is an issue, one option to reduce assessment time is to deploy GEARS clients to devices subject to endpoint assessment. GEARS is from OPSWAT the company providing the underlying technology, OESIS Framework, used by Cisco to detect security applications as part of endpoint assessment. GEARS runs as a background service and continuously checks the device for presence/status of AVs (and other security applications such as personal firewalls, hard disk encryption, anti-phishing). ASA can via registry/process check what GEARS reports as to compliance of the endpoint device and make an enforcement decision (grant or block access). A guide to configuring GEARS to work with ASA is attached.
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...
Ready to learn more about SecureX? Our Cisco security expert @Juan Ponce Dominguez reviews the features and benefits of SecureX, as well as a product demo covering:
Customising SecureX dashboards to create a single pane, unified visibility