Overview of Cisco ISE

Introduction to Cisco ISE

Cisco Identity Services Engine (ISE) is an identity-based network access control and policy enforcement system. It functions as a common policy engine that enables endpoint access control and network device administration for enterprises.

You can leverage Cisco ISE to ensure compliance, enhance infrastructure security, and streamline service operations.

A Cisco ISE administrator can gather real-time contextual data for a network, including users and user groups (who?), device type (what?), access time (when?), access location (where?), access type (wired, wireless, or VPN) (how?), and network threats and vulnerabilities.

As a Cisco ISE administrator, you can use this information to make network governance decisions. You can also tie identity data to various network elements to create policies that govern network access and usage.

Cisco ISE Features

Cisco ISE software must be installed as is. You cannot install any other third-party applications at the underlying operating system level.

Cisco ISE empowers you with the following capabilities:

  • Device Administration: Cisco ISE uses the TACACS+ security protocol to control and audit the configuration of network devices. It facilitates granular control of who can access which network device and change the associated network settings. Network devices can be configured to query Cisco ISE for authentication and authorization of device administrator actions. These devices also send accounting messages to Cisco ISE to log such actions.

  • Guest and Secure Wireless: Cisco ISE enables you to provide secure network access to visitors, contractors, consultants, and customers. You can use web-based and mobile portals to on-board guests to your company’s network and internal resources. You can define access privileges for different types of guests, and assign sponsors to create and manage guest accounts.

  • Bring Your Own Device (BYOD): Cisco ISE allows your employees and guests to securely use their personal devices on your enterprise network. BYOD feature end users can use configured pathways to add their devices, and provision predefined authentications and levels of network access.

  • Asset Visibility: Cisco ISE gives you visibility and control over who and what is on your network consistently, across wireless, wired, and VPN connections. Cisco ISE uses probes and device sensors to listen to the way devices connect to the network. The Cisco ISE profile database, which is extensive, then classifies the device. This gives the visibility and context you need to grant the right level of network access.

  • Secure Access: Cisco ISE uses a wide range of authentication protocols to provide network devices and endpoints with a secure network access. These include, but are not limited to, 802.1X, RADIUS, MAB, web-based, EasyConnect, and external agent-enabled authentication methods.

  • Segmentation: Cisco ISE uses contextual data about network devices and endpoints to facilitate network segmentation. Security group tags, access control lists, network access protocols, and policy sets that define authorization, access, and authentication, are some ways in which Cisco ISE enables secure network segmentation.

  • Posture or Compliance: Cisco ISE allows you to check for compliance, also known as posture, of endpoints, before allowing them to connect to your network. You can ensure that endpoints receive the appropriate posture agents for posturing services.

  • Threat Containment: If Cisco ISE detects threat or vulnerability attributes from an endpoint, adaptive network control policies are sent to dynamically change the access levels of the endpoint. After the threat or vulnerability is evaluated and addressed, the endpoint is given back its original access policy.

  • Security Ecosystem Integrations: The pxGrid feature allows Cisco ISE to securely share context-sensitive information, policy and configuration data, and so on, with connected network devices, third-party vendors, or Cisco partner systems.

Cisco ISE Administrators

Administrators can use the admin portal to:

  • Manage deployments, help desk operations, and network devices, and node monitoring and troubleshooting.

  • Manage Cisco ISE services, policies, administrator accounts, and system configuration and operations.

  • Change administrator and user passwords.

A CLI administrator can start and stop the Cisco ISE application, apply software patches and upgrades, reload or shut down the Cisco ISE appliance, and view all the system and application logs. Because of the special privileges that are granted to a CLI administrator, we recommend that you protect the CLI administrator credentials and create web-based administrators for configuring and managing Cisco ISE deployments.

The username and password that you configure during setup is intended only for administrative access to the CLI. This role is considered to be the CLI admin user, also known as CLI administrator. By default, the username for a CLI admin user is admin, and the password is defined during setup. There is no default password. This CLI admin user is the default admin user, and this user account cannot be deleted. However, other administrators can edit it, including options to enable, disable, or change password for the corresponding account.

You can either create an administrator, or promote an existing user to an administrator role. Administrators can also be demoted to simple network user status by disabling the corresponding administrative privileges.

Administrators are users who have local privileges to configure and operate the Cisco ISE system.

Administrators are assigned to one or more admin groups.


Note


From Cisco ISE Release 2.7, use alphanumeric values while creating user accounts in Cisco ISE.


Force CLI Administrator to Use External Identity Store

Authentication with an external identity source is more secure than using the internal database.

Define a User’s Attributes in the Active Directory User Directory

Using the Windows server running Active Directory, modify the attributes for each user that you plan to configure as a CLI Administrator.

  1. From the Server Manager window, choose Server Manager > Roles > Active Directory Domain Services > Active Directory Users and Computers > [ ad.adserver ] <ad_server>.local.

  2. Enable Advanced Features under the View menu so that you can edit a user’s attributes.

  3. Navigate to the Active Directory group that contains a list of all the admin users and select a user.

  4. Double-click the corresponding user ID.

    The Properties window is displayed.

  5. Click the Attribute Editor.

  6. Click any attribute and start entering gid to locate the gidNumber. If you don't find the gidNumber attribute, click the Filter button and uncheck the Show only attributes that have values check box.

  7. Double-click an attribute name to edit each attribute. For each user:

    • Assign a uidNumber greater than 60000, and make sure that the number is unique. Do not change the uidNumber after assignment.

    • Assign gidNumber as 110 or 111. While 110 denotes an admin user, whereas 111 denotes a read-only user. If you modify the gidNumber, wait for at least five minutes before making an SSH connection.

Join the Admin CLI User to the Active Directory Domain

Connect to the Cisco ISE CLI, run the identity-store command, and assign the Admin user to the ID store. For example, to map the CLI admin user to the Active Directory defined in ISE as adpool1, run the identity-store active-directory domain-name adpool1 user admincliuser command.

After the join is complete, connect to the Cisco ISE CLI and log in as the Admin CLI user to verify your configuration.

If the domain you use in this command was previously joined to the ISE node, you must rejoin the domain in the Administrators console.

  1. In the Cisco ISE GUI, click the Menu icon () and choose Administration > Identity Management > External Identity Sources.

  2. In the left-hand pane, click Active Directory and select your Active Directory name.


    Note


    If you test the connection, with the test user using either MS-RPC or Kerberos, the status for your Active Directory connection might show Operational, but error messages are displayed.


  3. Verify that you can still log in to the Cisco ISE CLI as the Admin CLI user.

Create a New Administrator

Cisco ISE administrators need accounts with specific roles assigned to them in order to perform specific administrative tasks. You can create multiple administrator accounts and assign one or more roles to these admins based on the administrative tasks that these admins have to perform.

Use the Admin Users window to view, create, modify, delete, change the status, duplicate, or search for attributes of Cisco ISE administrators.


Note


We recommend that you configure Active Directory access in the CLI before you join it in the GUI if the admin user's domain is the same in both the CLI and the GUI. Else, you must rejoin the domain from the GUI to avoid authentication failures to that domain.

Procedure


Step 1

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Admin Access > Administrators > Admin Users > Add.

Step 2

From the Add drop-down list, choose one of the following options:

  • Create an Admin User

    If you choose Create an Admin User, a New Administrator window appears, from where you can configure account information for the new admin user.

  • Select from Network Access Users

    If you choose Select from Network Access Users, a list of current users appears, from which you can choose a user. Subsequently, the Admin User window corresponding to this user appears.

Step 3

Enter values in the fields. The characters supported for the Name field are # $ ’ ( ) * + - . / @ _.

The admin user name must be unique. If you have entered an existing user name, an error pop-up window displays the following message:

User can't be created. A User with that name already exists.

Step 4

Click Submit to create a new administrator in the Cisco ISE internal database.


Cisco ISE Administrator Groups

Administrator groups are role-based access control (RBAC) groups in Cisco ISE. All the administrators who belong to the same group share a common identity and have the same privileges. An administrator’s identity as a member of a specific administrative group can be used as a condition in authorization policies. An administrator can belong to more than one administrator group.

Cisco ISE supports multiple external identity stores for enhanced user access management by admins.

An administrator account with any level of access can be used to modify or delete the objects for which it has permission, on any window it has access to.

The Cisco ISE security model limits administrators to create administrative groups that contain the same set of privileges that the administrator has. The privileges given are based on the administrative role of the user, as defined in the Cisco ISE database. Thus, administrative groups form the basis for defining privileges to access the Cisco ISE systems.

The following table lists the admin groups that are predefined in Cisco ISE, and the tasks that members from these groups can perform.

Table 1. Cisco ISE Admin Groups, Access Levels, Permissions, and Restrictions

Admin Group Role

Access Level

Permissions

Restrictions

Customization Admin

Manage sponsor, guest, and personal device portals.

  • Configure guest and sponsor access.

  • Manage guest access settings.

  • Customize end-user web portals.

  • Cannot perform any policy management, identity management, or system-level configuration tasks in Cisco ISE.

  • Cannot view any reports.

Helpdesk Admin

Query monitoring and troubleshooting operations

  • Run all reports.

  • Run all troubleshooting flows.

  • View the Cisco ISE dashboard and live logs.

  • View alarms.

Cannot create, update, or delete reports, troubleshooting flows, live authentications, or alarms.

Identity Admin

  • Manage user accounts and endpoints.

  • Manage identity sources.

  • Add, edit, and delete user accounts and endpoints.

  • Add, edit, and delete identity sources.

  • Add, edit, and delete identity source sequences.

  • Configure general settings for user accounts (attributes and password policy).

  • View the Cisco ISE dashboard, live logs, alarms, and reports.

  • Run all troubleshooting flows.

Cannot perform any policy management or system-level configuration tasks in Cisco ISE.

MnT Admin

Perform all the monitoring and troubleshooting operations.

  • Manage all the reports (run, create, and delete).

  • Run all the troubleshooting flows.

  • View the Cisco ISE dashboard and live logs.

  • Manage alarms (create, update, view, and delete).

Cannot perform any policy management, identity management, or system-level configuration tasks in Cisco ISE.

Network Device Admin

Manage Cisco ISE network devices and network device repository.

  • Read and write permissions on network devices

  • Read and write permissions on Network Device Groups and all network resource object types.

  • View the Cisco ISE dashboard, live logs, alarms, and reports.

  • Run all the troubleshooting flows.

Cannot perform any policy management, identity management, or system-level configuration tasks in Cisco ISE.

Policy Admin

Create and manage policies for all the Cisco ISE services across the network, which are related to authentication, authorization, posture, profiler, client provisioning, and work centers.

  • Read and write permissions on all the elements that are used in policies, such as authorization profiles, Network Device Groups (NDGs), and conditions.

  • Read and write permissions on identities, endpoints, and identity groups (user identity groups and endpoint identity groups).

  • Read and write permissions on services policies and settings.

  • View the Cisco ISE dashboard, live logs, alarms, and reports.

  • Run all the troubleshooting flows.

  • Device Administration: Access to device administration work centers. Permission for TACACS policy conditions and results. Network device permissions for TACACS proxy and proxy sequences.

Cannot perform any identity management or system-level configuration tasks in Cisco ISE.

Device Administration: Access to the work center does not guarantee access to the subordinate links.

RBAC Admin

All the tasks under the Operations menu, except for Adaptive Network Control, and partial access to some menu items under Administration.

  • View the authentication details.

  • Enable or disable Adaptive Network Control

  • Create, edit, and delete alarms; generate and view reports; and use Cisco ISE to troubleshoot problems in your network.

  • Read permissions on administrator account settings and admin group settings

  • View permissions on admin access and data access permissions in the RBAC Policy window.

  • View the Cisco ISE dashboard, live logs, alarms, and reports.

  • Run all the troubleshooting flows.

Cannot perform any identity management or system-level configuration tasks in Cisco ISE.

Read-Only Admin

Read-only access to the ISE GUI.

  • View and use the functions of the dashboard, reports, and live logs or sessions, such as filtering data, querying, saving options, printing, and exporting data.

  • Change passwords of their own accounts.

  • Query ISE using global search, reports, and live logs or sessions.

  • Filter and save data based on the attributes.

  • Export data pertaining to authentication policies, profile policies, users, endpoints, network devices, network device groups, identities (including groups), and other configurations.

  • Customize report queries, save, print, and export them.

  • Generate custom report queries, save, print, or export the results.

  • Save GUI settings for future reference.

  • Download logs, such as ise-psc-log from the Operations > Troubleshoot > Download Logs window.

  • Perform any configuration changes such as create, update, delete, import, quarantine, and Mobile Device Management (MDM) actions of objects, such as authorization policies, authentication policies, posture policies, profiler policies, endpoints, and users.

  • Perform system operations, such as backup and restore, registration or deregistration of nodes, synchronization of nodes, creating, editing, and deleting node groups, or upgrade and installation of patches.

  • Import data pertaining to policies, network devices, network device groups, identities (including groups), and other configurations.

  • Perform operations, such as CoA, endpoint debugging, modifying collection filters, bypassing suppression on live sessions data, modifying the PAN-HA failover settings, and editing the personas or services of Cisco ISE nodes.

  • Run commands that might have a heavy impact on performance. For example, access to the TCP Dump in the Operations > Troubleshoot > Diagnostic Tools > General Tools window is restricted.

  • Generate support bundles.

Super Admin

All Cisco ISE administrative functions. The default administrator account belongs to this group.

Create, read, update, delete, and eXecute (CRUDX) permissions on all Cisco ISE resources.

A super admin can modify the credentials of any Cisco ISE local user at any time.

Note

 

The super admin user cannot modify the default system-generated RBAC policies and permissions. To do this, you must create new RBAC policies with the necessary permissions based on your needs, and map these policies to an admin group.

Device Administration: Access to device administration work centers. Permission for TACACS policy conditions and results. Network device permissions for TACACS proxy and proxy sequences. In addition, permission to enable TACACS global protocol settings.

  • Device Administration: Access to the work center does not guarantee access to the subordinate links.

  • Only an admin user from the default Super Admin Group can modify or delete other admin users. Even an externally mapped user who is part of an Admin Group cloned with the Menu and Data Access privileges of the Super Admin Group cannot modify or delete an admin user.

System Admin

All Cisco ISE configuration and maintenance tasks.

Full access (read and write permissions) to perform all the activities under the Operations tab and partial access to some menu items under the Administration tab:

  • Read permissions on administrator account settings and administrator group settings.

  • Read permissions on admin access and data access permissions along with the RBAC policy window.

  • Read and write permissions for all options under Administration > System.

  • View authentication details.

  • Enable or disable Adaptive Network Control

  • Create, edit, and delete alarms; generate and view reports; and use Cisco ISE to troubleshoot problems in your network.

  • Device Administration: Permission to enable TACACS global protocol settings.

Cannot perform any policy management or system-level configuration tasks in Cisco ISE.

Elevated System Admin (available in Cisco ISE Release 2.6, Patch 2 and later)

All Cisco ISE configuration and maintenance tasks.

In addition to all the privileges of the System Admin, an Elevated System Admin can create Admin users.

  • Cannot create or delete Super Admin users.

  • Cannot manage the Super Admin groups.

External RESTful Services (ERS) Admin

Full access to all the ERS API requests such as GET, POST, DELETE, PUT

  • Create, read, update, and delete ERS API requests.

The role is meant only for ERS authorization supporting internal users, identity groups, endpoints, endpoint groups, and SGT .

External RESTful Services (ERS) Operator

Read-only access to ERS API, only GET

  • Can only read ERS API requests

The role is meant only for ERS authorization supporting internal users, identity groups, endpoints, endpoint groups, and SGT.

TACACS+ Admin

Full access

Access to:

  • Device Administration Work Center.

  • Deployment: To enable TACACS+ services.

  • External ID stores.

  • Operations > TACACS Live Logs window.

Create an Admin Group

The Admin Groups window allows you to view, create, modify, delete, duplicate, or filter Cisco ISE network admin groups.

Before you begin

To configure an external administrator group type, you must have already specified one or more external identity stores.

Procedure


Step 1

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Admin Access > Administrators > Admin Groups

Step 2

Click Add, and enter a name and description.

The supported special characters for the Name field are: space, # $ & ‘ ( ) * + - . / @ _ .

Step 3

Check the corresponding check box to specify the Type of administrator group you are configuring:

  • Internal: Administrators assigned to this group type authenticate against the credentials that are stored in the Cisco ISE internal database.

  • External: Administrators assigned to this group authenticate against the credentials stored in the external identity store that you select in the Administration > System > Admin Access > Authentication > Authentication Method window. You can specify the external groups, if required.

Note

 

If an internal user is configured with an external identity store for authentication, while logging in to the ISE Admin portal, the internal user must select the external identity store as the Identity Source. Authentication will fail if Internal Identity Source is selected.

Step 4

Click Add in the Member Users area to add users to this admin group. To delete users from the admin group, check the check box corresponding to the user that you want to delete, and click Remove.

Step 5

Click Submit.


Administrative Access to Cisco ISE

Cisco ISE administrators can perform various administrative tasks based on the administrative group to which they belong. These administrative tasks are critical. Grant administrative access only to users who are authorized to administer Cisco ISE in your network.


Note


When a Cisco ISE server is added to a network, it is marked to be in Running state after its web interface comes up. However, it might take some more time for all the services to be fully operational because some advanced services, such as posture services, might take longer to be available.


Administrative Access Methods

You can connect to the Cisco ISE servers in several ways. The policy administration node (PAN) runs the Administrators portal. An admin password is required to log in. Other ISE persona servers are accessible through SSH or the console, from where you run the CLI. This section describes the process and password options available for each connection type:

  • Admin password: The Cisco ISE Admin user that you created during installation, times out in 45 days by default. You can prevent that by turning off Password Lifetime from Administration > System > Admin Settings. Click the Password Policy tab, and uncheck theAdministrative passwords expire check box under Password Lifetime.

    If you do not do this, and the password expires, you can reset the admin password in the CLI by running the application reset-passwd command. You can reset the admin password by connecting to the console to access the CLI, or by rebooting the ISE image file to access the boot options menu.

  • CLI password: You must enter a CLI password during installation. If you have a problem logging in to the CLI because of an invalid password, you can reset the CLI password. Connect to the console and run the password CLI command to rest the password. See the Cisco Identity Services Engine CLI Reference Guide for more information.

  • SSH access to the CLI: You can enable SSH access either during installation or after, using the service sshd command. You can also force SSH connections to use a key. Note that when you do this, SSH connections to all the network devices also use that key. For more information, see SSH Key Validation. You can force the SSH key to use the Diffie-Hellman algorithm. Note that ECDSA keys are not supported for SSH keys.

Role-Based Admin Access Control in Cisco ISE

Cisco ISE provides role-based access control (RBAC) policies that ensure security by restricting administrative privileges. RBAC policies are associated with default admin groups to define roles and permissions. A standard set of permissions (for menu as well as data access) is paired with each of the predefined admin groups, and is thereby aligned with the associated role and job function.

Some features in the user interface require certain permissions for their use. If a feature is unavailable, or you are not allowed to perform a specific task, your admin group may not have the necessary permissions to perform the task that utilizes the feature.

Regardless of the level of access, any administrator account can modify or delete objects for which it has permission, on any window that it can access.


Note


Only system-defined admin users with Super Admin or Read Only Admin permissions can see the identity-based users who are not a part of a user group. Admins you create without these permissions cannot see these users.


Role-Based Permissions

Cisco ISE allows you to configure permissions at the menu and data levels. These are called menu access and data access permissions.

The menu access permissions allow you to show or hide the menu and submenu items of the Cisco ISE administrative interface. This feature lets you create permissions so that you can restrict or enable access at the menu level.

The data access permissions allow you to grant read and write, read only, or no access to the Admin Groups, User Identity Groups, Endpoint Identity Groups, Locations, and Device Types data in the Cisco ISE interface.

RBAC Policies

RBAC policies determine if an administrator can be granted a specific type of access to a menu item or other identity group data elements. You can grant or deny access to a menu item or identity group data element to an administrator based on the admin group, by using RBAC policies. When administrators log in to the Admin portal, they can access menus and data that are based on the policies and permissions defined for the admin groups with which they are associated.

RBAC policies map admin groups to menu access and data access permissions. For example, you can prevent a network administrator from viewing the Admin Access operations menu and the policy data elements. This can be achieved by creating a custom RBAC policy for the admin group with which that network administrator is associated.


Note


If you are using customized RBAC policies for admin access, ensure that you provide all the relevant menu access for a given data access. For example, to add or delete endpoints with data access of Identity or Policy Admin, you must provide menu access to Work Center > Network Access and Administration > Identity Management.


Default Menu Access Permissions

Cisco ISE provides an out-of-the-box set of permissions that are associated with a set of predefined admin groups. Having predefined admin group permissions allow you to set permissions so that a member of any admin group can have full or limited access to the menu items within the administrative interface (known as menu access) and to delegate an admin group to use the data access elements of other admin groups (known as data access). These permissions are reusable entities that can be further used to formulate RBAC policies for various admin groups. Cisco ISE provides a set of system-defined menu access permissions that are already used in the default RBAC policies. Apart from the predefined menu access permissions, Cisco ISE also allows you to create custom menu access permissions that you can use in RBAC policies. The key icon represents menu access privileges for the menus and submenus, and the key with a close icon represents no access for different RBAC groups.


Note


For a Super Admin user, all the menu items are available. For other admin users, all the menu items in the Menu Access Privileges column are available for standalone deployment, and primary node in a distributed deployment. For secondary nodes in a distributed deployment, the menu items under the Administration tab are not available.


Table 2. Default Menu Access Permissions for Different Admin Groups

Menus and Submenus

Super Admin Menu Access

Policy Admin Menu Access

Helpdesk Admin Menu Access

Identity Admin Menu Access

Network Admin Menu Access

System Admin Menu Access

RBAC Admin Menu Access

MnT Admin Menu Access

Customization Admin Menu Access

TACACS+ Admin Menu Access

Home

x

x

Home > Introduction

x

x

Home > Dashboard

x

x

Context Visibility

x

x

Context Visibility > Endpoints

x

x

Context Visibility > Users

x

x

Context Visibility > Network Devices

x

x

Context Visibility > Application

x

x

Operations

x

Operations > Adaptive Network Control

x

x

x

x

x

x

x

x

Operations > Adaptive Network Control > Policy List

x

x

x

x

x

x

x

x

Operations > Adaptive Network Control > Endpoint Assignment

x

x

x

x

x

x

x

x

Operations > Reports

x

x

Operations > RADIUS

x

x

Operations > RADIUS > Live Logs

x

x

Operations > RADIUS > Live Sessions

x

x

Operations > Threat-Centric NAC Live Logs

x

x

Operations > TACACS

x

Operations > TACACS > Live Logs

x

Operations > Troubleshoot

x

x

Operations > Troubleshoot > Download Logs

x

x

x

x

x

x

x

x

x

Operations > Troubleshoot > Diagnostic Tools

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > RADIUS Authentication Troubleshooting

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > Execute Network Device Command

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > Evaluate Configuration Validator

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > Posture Troubleshooting

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > Agentless Posture Troubleshooting

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > EndPoint Debug

x

x

x

x

x

x

x

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > TCP Dump

x

x

x

x

x

x

x

x

x

Operations > Troubleshoot > Diagnostic Tools > General Tools > Session Trace Tests

x

x

Operations > Troubleshoot > Diagnostic Tools > Security Group Access Tools

x

x

Operations > Troubleshoot > Diagnostic Tools > Security Group Access Tools > SXP-IP Mappings

x

x

Operations > Troubleshoot > Diagnostic Tools > Security Group Access Tools > IP User SGT

x

x

Operations > Troubleshoot > Diagnostic Tools > Security Group Access Tools > Egress (SGACL) Policy

x

x

Operations > Troubleshoot > Diagnostic Tools > Security Group Access Tools > Device SGT

x

x

Operations > Troubleshoot > Debug Wizard

x

x

Operations > Troubleshoot > Debug Wizard > Debug Log Configuration

x

x

Operations > Troubleshoot > Debug Wizard > Debug Profile Configuration

x

x

Policy

x

x

x

x

x

x

x

x

Policy > Policy Sets

x

x

x

x

x

x

x

x

Policy > Policy Elements

x

x

x

x

x

x

x

x

Policy > Policy Elements > Dictionaries

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Library Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Library Conditions > Simple Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Smart Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Authorization

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Authorization > Simple Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Authorization > Compound Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Time and Date

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Anti-Spyware Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Application Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Dictionary Compound Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Dictionary Simple Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Disk Encryption Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > External DataSource Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > File Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Firewall Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Hardware Attributes Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Patch Management Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Registry Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Service Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > USB Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Anti-Malware Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Anti-Virus Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Posture > Compound Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Network Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Network Conditions > Endstation Network Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Network Conditions > Device Port Network Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Network Conditions > Device Network Conditions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Conditions > Profiling

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Authentication

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Authentication > Allowed Protocols

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Authorization

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Authorization > Authorization Profiles

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Authorization > Downloadable ACLs

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Profiling

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Profiling > Exception Actions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Profiling > Network Scan (NMAP) Actions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Requirements

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Anti-Malware Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Anti-Virus Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Firewall Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Link Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Script Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > USB Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Windows Update Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Application Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Anti-Spyware Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > File Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Launch Program Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Patch Management Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Posture > Remediation Actions > Windows Server Update Services Remediation

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Client Provisioning

x

x

x

x

x

x

x

x

Policy > Policy Elements > Results > Client Provisioning > Resources

x

x

x

x

x

x

x

x

Policy > Policy Sets

x

x

x

x

x

x

x

x

Policy > Authentication

x

x

x

x

x

x

x

x

Policy > Authorization

x

x

x

x

x

x

x

x

Policy > Profiling

x

x

x

x

x

x

x

x

Policy > Posture

x

x

x

x

x

x

x

x

Policy > Client Provisioning

x

x

x

x

x

x

x

x

Administration

x

x

Administration > Identity Management

x

x

x

x

x

x

Administration > Identity Management > Identities

x

x

x

x

x

x

x

Administration > Identity Management > Identities > Users

x

x

x

x

x

x

x

Administration > Identity Management > Identities > Latest Manual Network Scan Results

x

x

x

x

x

x

x

Administration > Identity Management > Groups

x

x

x

x

x

x

x

Administration > Identity Management > External Identity Sources

x

x

x

x

x

x

Administration > Identity Management > Identity Source Sequences

x

x

x

x

x

x

x

Administration > Identity Management > Settings

x

x

x

x

x

x

x

Administration > Identity Management > Settings > User Custom Attributes

x

x

x

x

x

x

x

Administration > Identity Management > Settings > Endpoint Purge

x

x

x

x

x

x

x

Administration > Identity Management > Settings > User Authentication Settings

x

x

x

x

x

x

x

Administration > Identity Management > Settings > Endpoint Custom Attributes

x

x

x

x

x

x

x

Administration > Identity Management > Settings > REST ID Store Settings

x

x

x

x

x

x

x

Administration > Device Portal Management

x

x

x

x

x

x

x

Administration > Device Portal Management > BYOD

x

x

x

x

x

x

x

Administration > Device Portal Management > Client Provisioning

x

x

x

x

x

x

x

Administration > Device Portal Management > My Devices

x

x

x

x

x

x

x

Administration > Device Portal Management > Blocked List

x

x

x

x

x

x

x

Administration > Device Portal Management > Certificate Provisioning

x

x

x

x

x

x

x

x

x

Administration > Device Portal Management > Mobile Device Management

x

x

x

x

x

x

x

Administration > Device Portal Management > Custom Portal Files

x

x

x

x

x

x

x

x

x

Administration > Device Portal Management > Settings

x

x

x

x

x

x

x

Administration > Device Portal Management > Settings > Retry URL

x

x

x

x

x

x

x

Administration > Device Portal Management > Settings > Employee Registered Devices

x

x

x

x

x

x

x

Administration > Network Resources

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Devices

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Devices > Default Device

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Devices > Network Devices

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Devices > Device Security Settings

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Device Groups

x

x

x

x

x

x

x

x

Administration > Network Resources > External RADIUS Servers

x

x

x

x

x

x

x

x

Administration > Network Resources > NAC Managers

x

x

x

x

x

x

x

x

Administration > Network Resources > Location Services

x

x

x

x

x

x

x

x

Administration > Network Resources > Location Services > Location Servers

x

x

x

x

x

x

x

x

Administration > Network Resources > Location Services > Location Tree

x

x

x

x

x

x

x

x

Administration > Network Resources > Network Device Profiles

x

x

x

x

x

x

x

x

Administration > Network Resources > RADIUS Server Sequences

x

x

x

x

x

x

x

x

Administration > Network Resources > External MDM

x

x

x

x

x

x

x

x

x

Administration > pxGrid Services

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Summary

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > Clients

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > Policy

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > Groups

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > Certificates

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > pxCloud Connection

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Client Management > pxCloud Policy

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Diagnostics

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Diagnostics > WebSocket

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Diagnostics > Log

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Diagnostics > Tests

x

x

x

x

x

x

x

x

Administration > pxGrid Services > Settings

x

x

x

x

x

x

x

x

Administration > System

x

x

x

x

x

Administration > System > Backup & Restore

x

x

x

x

x

x

x

x

Administration > System > Backup & Restore > Policy Export

x

x

x

x

x

x

x

x

Administration > System > Backup & Restore > Backup & Restore

x

x

x

x

x

x

x

x

Administration > System > Admin Access

x

x

x

x

x

x

x

Administration > System > Admin Access > Administrators

x

x

x

x

x

x

x

Administration > System > Admin Access > Administrators > Admin Users

x

x

x

x

x

x

x

Administration > System > Admin Access > Administrators > Admin Groups

x

x

x

x

x

x

x

Administration > System > Admin Access > Authentication

x

x

x

x

x

x

x

Administration > System > Admin Access > Authorization

x

x

x

x

x

x

x

Administration > System > Admin Access > Authorization > Permissions

x

x

x

x

x

x

x

Administration > System > Admin Access > Authorization > Permissions > Menu Access

x

x

x

x

x

x

x

Administration > System > Admin Access > Authorization > Permissions > Data Access

x

x

x

x

x

x

x

Administration > System > Admin Access > Authorization > Policy

x