Cisco Cisco Identity Services Engine 1.2 入门指南

下载
页码 2
•  Users of vulnerability assessment partner products can then use the 
Identity Services Engine to take mitigation actions within the Cisco 
network infrastructure. The engine can undertake a quarantine or 
block access to specific users and devices based on policies defined 
by the engine for such actions.
•  All of these functions can be logged and reported upon within the 
vulnerability assessment platform, providing unified, networkwide 
security reporting.
Some of the main Identity Services Engine attributes available for use by 
vulnerability assessment platforms for user- and device-related context 
are: 
•  User: User name, IP address, authentication status, location
•  User class: Authorization group, guest, quarantined
•  Device: Manufacturer, model, OS, OS version, MAC address, IP 
address, network connection method (wired or wireless), location
•  Posture: Posture compliance status, antivirus installed, antivirus 
version, OS patch level, mobile device posture compliance status 
through mobile device management (MDM) ecosystem partners
At-A-Glance
At-a-Glance
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of 
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner 
does not imply a partnership relationship between Cisco and any other company. (1110R) 
C45-733044-01  05/15
Next Steps 
To learn more about the Cisco Identity 
Services Engine, visit 
.
For additional information regarding 
Identity Services Engine Vulnerability 
Assessment partners, visit