Which devices would be evaluated by device profiling rules?
Rogue devices, each time they connect
All hosts, each time they connect
Known trusted devices, each time they change location
Rogue devices, only when they are initially added to the database
Submit