A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?
stoneface
Highly Voted 2 years, 10 months agoJ_Ark1
2 years, 7 months agoProtract8593
Highly Voted 1 year, 11 months agoLordJaraxxus
Most Recent 1 year, 4 months agoApplebeesWaiter1122
1 year, 11 months agoGravoc
2 years, 9 months ago