Cisco Cisco Identity Services Engine Software Manual Técnica

Descargar
Página de 24
ISE
On ISE itself regular posture flow is seen, redirection takes place first to check network
compliance. As soon as the endpoint  is compliant, CoA Reauth is sent and new profile with
PermitAccess is assigned.
To view the detected Threats you can navigate to Context Visibility > Endpoints > Compromised
Endpoints