An administrator manages a corporate environment where all users log into the corporate domain each time they connect to the network. The administrator wants to leverage login scripts to use a FortiNAC-F agent to enhance endpoint visibility
Which agent can be deployed as part of a login script?
While discovering network infrastructure devices, a switch appears in the inventory topology with a question mark (?) on the icon. What would cause this?
An administrator wants to build a security rule that will quarantine contractors who attempt to access specific websites.
In addition to a user host profile, which Iwo components must the administrator configure to create the security rule? (Choose two.)
An administrator wants to create a conference manager administrator account but would like to limit the number of conference accounts that can be generated to 30.
Which statement about conference accounts is true?
When FortiNAC-F is managing VPN clients connecting through FortiGate, why must the clients run a FortiNAC-F agent?
How can an administrator configure FortiNAC-F to normalize incoming syslog event levels across vendors?