A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
scally
Highly Voted 2Â years agoMalonJay
Most Recent 2Â months, 3Â weeks agoJRKhan
8Â months, 2Â weeks agodorf05
10Â months, 3Â weeks agodorf05
10Â months, 3Â weeks agoTheIronSheik
1Â year, 7Â months agofloonky
1Â year, 7Â months agoconfusion
1Â year, 11Â months agomizuno92
2Â years agojuan_L
2Â years ago