Home LookingPoint Blog


Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

It’s been a while, but we’re finally back to close this blog series on Cisco TrustSec (CTS). If you haven’t yet, go check out the other entries in this series.

Learn what Cisco TrustSec is and why we care here.

Dip your toes into the components involved here.

Begin your Cisco TrustSec classification journey here.

Propagate yourself over here to learn about Cisco TrustSec propagation.

Now that...

Continue reading

Welcome back! In this blog we’re going to continue where we left off in the last entry where we looked at using Microsoft Intune to provision the native wired 802.1x supplicant on Windows 10. This time, we shift our focus to the wireless 802.1x supplicant. If you missed that one, be sure to check it out! OK! Let’s go!

Continue reading

Welcome back! In this blog we’re going to take a detour from our TrustSec series to introduce some modern endpoint management techniques in Microsoft Intune. Almost every customer we are working with is starting the journey to modern endpoint management with Microsoft Intune. As the functionality of Azure AD + Intune continues to mature, that once far away thought of shutting down those Microsoft...

Continue reading

Today we’ll be going over how to add a Cisco switch to ISE 3.0 for TACACS administration. For this configuration you’ll need an ISE PSN (Policy Service Node) node with Device Admin Services enabled and either a Cisco switch or router running IOS.

Continue reading

The topic of backing up is not always linear. Backing up a system can sometimes be confusing topic among System and Network Engineers. There are always multiple ways to back up and restore, but is it the recommended for the system? For example, experience has shown me that enabling virtual machine snapshots to systems like ISE can present itself with larger operational issues like sporadic...

Continue reading

It’s that time! Get up-to-date! In this entry we will be covering a MAJOR upgrade of a two-node ISE deployment from version 2.4 to version 3.0! Before you attempt this in your environment, read all the release notes in order to confirm your unique path and requirements! Good, let’s go!

Continue reading

Chooo Chooo!  The TrustSec Trains keeps rolling down the tracks in this latest entry.  We’ve made stops along the way to tell you what TrustSec is, to give you a primer to TrustSec, to dig into the TrustSec classification, and now we move on to TrustSec Propagation!  Right, so let’s go*! 

Continue reading

Recently I have been working on a couple of new ISE deployments for our customers and noticed the same ISE alarm (Active directory diagnostic tool found issues) was firing in both environments.

Continue reading

Having fun yet? Yeah? Well hold on to your hat because in this entry we’re going to dig into CTS classification!! Let’s try that again with a little more alliteration. Today we’re collapsing all of our coverage so as to claw at and climb into every crevice of CTS classification! Right, so let’s go*!

*If this is the first entry you are reading in this series on CTS or you don’t know what CTS...

Continue reading
1 2 3