A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
scally
Highly Voted 2 years agoMalonJay
Most Recent 2 months, 3 weeks agoJRKhan
8 months, 3 weeks agodorf05
10 months, 3 weeks agodorf05
10 months, 3 weeks agoTheIronSheik
1 year, 7 months agofloonky
1 year, 8 months agoconfusion
1 year, 11 months agomizuno92
2 years agojuan_L
2 years ago