Which connecting endpoints are evaluated against all enabled device profiling rules?
All hosts, each time they connect
Rogues devices, only when they connect for the first time
Known trusted devices each time they change location
Rogues devices, each time they connect
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.
TESTED 24 Apr 2024