An administrator is configuring MAB and needs to create profiling policies to support devices that do not match the built-in profiles. Which two steps must the administrator take in order to use these new profiles in authorization policies? (Choose two.)
SilentStock8
2 weeks, 6 days agoXBfoundX
1 year, 2 months agoJor466077
1 year, 2 months agoNikoTomas
11 months agothol119
1 year, 3 months ago