- A. Enter the MAC address in the correct Endpoint Identity Group.
- B. Enter the IP address in the correct Endpoint Identity Group.
- C. Enter the IP address in the correct Logical Profile.
- D. Enter the MAC address in the correct Logical Profile.
The post There are several devices on a network that are considered critical and need to be placed into the ISE database and a policy used for them. The organization does not want to use profiling.<br> What must be done to accomplish this goal? appeared first on Majanto.