- A. An endpoint that is disconnected from the network is discovered.
- B. Endpoints are created through device registration for the guests.
- C. An endpoint profiling policy is changed for authorization policy.
- D. An authenticated, wired EAP-capable endpoint is discovered.
The post Which use case validates a change of authorization? appeared first on Majanto.