Which connecting endpoints are evaluated against all enabled device profiling rules?

A. Known trusted devices each time they change location
B. Rogues devices, each time they connect
C. Rogues devices, only when they connect for the first time
D. All hosts, each time they connect
  Discussion forum

Question
0

Leave an answer