A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
scally
Highly Voted 1Â year, 10Â months agoMalonJay
Most Recent 5Â days, 17Â hours agoJRKhan
6Â months agodorf05
8Â months, 1Â week agodorf05
8Â months, 1Â week agoTheIronSheik
1Â year, 4Â months agofloonky
1Â year, 5Â months agoconfusion
1Â year, 8Â months agomizuno92
1Â year, 9Â months agojuan_L
1Â year, 10Â months ago