A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
scally
Highly Voted 2Â years, 3Â months agoMalonJay
Most Recent 5Â months, 3Â weeks agoJRKhan
11Â months, 3Â weeks agodorf05
1Â year, 1Â month agodorf05
1Â year, 1Â month agoTheIronSheik
1Â year, 10Â months agofloonky
1Â year, 11Â months agoconfusion
2Â years, 2Â months agomizuno92
2Â years, 3Â months agojuan_L
2Â years, 3Â months ago