Cisco ISE Posture Configuration In Simple Steps

In this guide, we will walk you through the Cisco ISE posture configuration process, a crucial step to ensure the security and compliance of devices before they access your network.

The posture check is a way to assess the health of a device to ensure it meets the company’s security requirements. For example, the system might check if the device has the latest security software updates, EDR (Endpoint Detection and Response) definitions. If the device passes these checks, it will be granted access to network resources. This helps keep the network secure by making sure only healthy devices can connect.

How does Cisco identity Service engine posture work in the backend?
To perform the posture assessment of an endpoint a posture agent needs to run which then further sends the posture state to the Cisco Identity services engine. Posture state can be either compliant or non-compliant or unknown. The posture agent also needs a compliance module that helps in accessing the posture status of the endpoint. We need to ensure the latest compliance module is been used on the ISE.

Refer to the previous post on the blog for advanced Cisco ISE posture configuration using script conditions.

Cisco ISE posture Configuration – Overview

The configuration involves the below 6 steps:

1> Define posture condition.
2> Create Requirements.
3> Create a posture policy.
4> Create a client provisioning policy.
5> Create an authorization profile and authorization policy.
6> Endpoint 802.1x configuration and agent installation on endpoint.

Cisco ISE posture configuration – Posture Condition

Step 1> Create a condition: Navigate to Policy > Policy Elements > Conditions > Posture – Click Add. For this post, we are configuring a firewall condition for Windows machines.

Note: We can create multiple conditions and use them in posture requirements.

Cisco ise posture configuration condition

Cisco ISE Posture firewall condition

Cisco ISE posture configuration – Posture Requirement

Step 2> Create a Requirement: Navigate to Policy > Policy Elements > Result > Posture > Requirements – Scroll to the right and click on the down arrow to select Insert New Requirement. For this post, we are configuring one requirement.

Note: We can create multiple requirements.

Cisco ISE posture Remediation

Give a name to the requirement, Select Windows All as an Operating System, and Select Compliance Module.

Cisco ISE Posture Remediation 1

Select the firewall condition under User Defined Conditions.

Cisco ISE Posture Remediation Condition 2

Select Remediation Action: When the device is non-compliant, the user will receive a message.

Cisco ISE Posture Remediation 2

Click Done and Save.

Cisco ISE posture configuration – Posture Policy

Step 3 > Create posture policy: Navigate to Policy > Posture – Scroll to the right and click the down arrow to select Insert New policy

Cisco ISE Posture Policy 1

Select the configured requirement, click Done, and Save.

Cisco ISE Posture Policy 2

Cisco ISE posture configuration – Client provisioning Policy

Step 4> Create Resources:

a) Upload Any connect package: Navigate to Policy > Policy Elements > Client Provisioning > Resources – Click Add and upload the Cisco Secure Client Headend Deployment package file (cisco-secure-client-win-x.x.x-webdeploy-k9.pkg). You can download the file from the Cisco software website.

Cisco ISE Client provisioning Resources

Select Cisco-provided packages, Browse, Confirm, and Submit.

Cisco ISE Client provisioning Resources 2

b) Create Posture Profile: Click Add and select Agent Posture Profile.

Posture profile

Give a name to the profile, update the fields as shown in screenshots, and leave the rest as default. Click Save.

Posture profile 1

Posture profile 2

c) Download compliance module: Click Add, select Agent resources from the Cisco Site, and download the latest compliance module. Ensure ISE has internet access.

Posture Download remote resources

d) Create Agent Configuration: Click Add and select Agent package.

Agent configuration 1

posture profile 4

e) Create a client provisioning Policy: Navigate to Policy > client provisioning.

Cisco ise posture configuration client provisioning policy

Cisco ISE posture configuration – Authorization Policy

Step 5> a) Navigate to Policy > Policy Elements > Result > Authorization > Authorization Profiles – Click Add

Note: In case of a connectivity issue with the endpoint, add a DACL to the authorization profile.

posture authorization profile

b) Create 3 Authorization rules under the policy set:

  1. Unknown posture status: Initially the device status will be unknown.
  2. Noncompliant posture status: The endpoint that doesn’t meet the compliance will hit this policy.
  3. Complaint posture status: The devices that are found to be compliant during the posture scan will hit this policy.

These posture conditions are predefined on the configuration we need to drag and drop.

Posture Policy Check

Note: The Switch side of the configuration we will discuss in a different post.

Radius Live logs:

Radius Live logs

Cisco ISE posture Configuration – Endpoint Tasks:

Step 6> We are assuming that ISE has 3rd party CA-signed certificate.

a) Browser opens automatically. It redirects the user to the client provisioning portal. Click on the start button for provisioning.

Endpoint agent configuration 1

Endpoint agent configuration 2

Click on “This is what to do next“.

Endpoint agent configuration 3

b) Download the file.

Endpoint agent configuration 4

c) Run the downloaded file. A network setup Assistant will open. Click Connect. During installation, we will see the following prompt.

Endpoint agent configuration 5

Endpoint agent configuration 6

Endpoint agent configuration 7

Endpoint agent configuration 8

Once the agent is installed it’s going to check for the requirements configured on the ISE and send the report back to ISE. A complaint status is shown below.

Endpoint agent configuration 9

Want to know how to form HA ( High Availability ) in Cisco ISE?

Refer to the posture remediation document to configure remediation actions.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.