Skip to Content
Cisco ISE for BYOD and Secure Unified Access
book

Cisco ISE for BYOD and Secure Unified Access

by Jamey Heary, Aaron Woland
June 2013
Intermediate to advanced
752 pages
17h 59m
English
Cisco Press
Content preview from Cisco ISE for BYOD and Secure Unified Access

Chapter 7. Building a Device Security Policy

The Cisco Identity Services Engine takes into account the security of the individual devices when determining the network access control policy to invoke. Chapter 6, “Building a Cisco ISE Network Access Security Policy,” discussed the creation of a network access security policy, part of which took into account the device’s security posture. Device posture assessment is one of two tools that Cisco ISE can use to determine the actual security of a network-connected device. ISE can use the following features to determine the device security policy to implement:

Image Host security posture assessment

Device ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cisco ISE for BYOD and Secure Unified Access, 2nd Edition

Cisco ISE for BYOD and Secure Unified Access, 2nd Edition

Aaron Woland, Jamey Heary

Publisher Resources

ISBN: 9780133103632Purchase book