Which connecting endpoints are evaluated against all enabled device profiling rules?
Question No 2
Which agent is used only as part of a login script?
Question No 3
What agent is required in order to detect an added USB drive?
Question No 4
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously
appeared on a port that is a member of the Forced Registration port group?