O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Building a Device Security Policy

The Cisco Identity Services Engine takes into account the security of the individual devices when determining the network access control policy to invoke. Chapter 6, “Building a Cisco ISE Network Access Security Policy,” discussed the creation of a network access security policy, part of which took into account the device’s security posture. Device posture assessment is one of two tools that Cisco ISE can use to determine the actual security of a network-connected device. ISE can use the following features to determine the device security policy to implement:

Image Host security posture assessment

Device ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required