An administrator wishes to enable Identity Awareness on the Check Point firewalls. However, they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
mfhashmi
1 year, 3 months agodarkdante24
1 year, 5 months agoCedric567
1 year, 6 months ago