Install the Passive Identity Agent Software
This task discusses how to install the passive identity agent software. For a simple installation, you can install it on your Microsoft Active Directory (AD) domain controller; for other options, see Deploy the Passive Identity Agent.
Before you begin
Procedure
Step 1 | Download the passive identity agent from software.cisco.com. | ||||||||
Step 2 | Log in as a member of the Administrators group to the machine on which to install the passive identity agent. | ||||||||
Step 3 | Double-click CiscoPassiveIdentityAgentInstaller-1.0.msi . | ||||||||
Step 4 | Click Next. | ||||||||
Step 5 | Choose a folder in which to install the passive identity agent and click Next. The default installation folder is Program Files\Program Files (x86)\Cisco\Cisco Passive Identity Agent . | ||||||||
Step 6 | Click Next. | ||||||||
Step 7 | Click Install. | ||||||||
Step 8 | When the installation is done, click Finish and optionally check the box to start the passive identity agent. | ||||||||
Step 9 | When the passive identity agent starts, click the On-Prem tab if you are using the agent with an on-premises Secure Firewall Management Center (physical or virtual) or click the Cloud tab if you are using the agent with cloud-delivered Firewall Management Center. | ||||||||
Step 10 | In the Cisco Passive Agent dialog box, enter the following information:
| ||||||||
Step 11 | Click the Agent list. | ||||||||
Step 12 | From the list, click the name of the domain controller to monitor. | ||||||||
Step 13 | Click Test. The following figure shows an example. | ||||||||
Step 14 | Only if the test succeeds, click Save. |
What to do next
-
Specify users to control and other options using an identity policy as described in Create an Identity Policy.
-
Associate the identity rule with an access control policy, which filters and optionally inspects traffic, as discussed in Associating Other Policies with Access Control.
-
Deploy your identity and access control policies to managed devices as discussed in Deploy Configuration Changes.
-
Monitor user activity .