Which use case validates a change of authorization?
An authenticated, wired EAP-capable endpoint is discovered
An endpoint profiling policy is changed for authorization policy.
An endpoint that is disconnected from the network is discovered
Endpoints are created through device registration for the guests
https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html
Submit