A network administrator is configuring a corporate network enforcement policy. The policy includes rules for corporate-issued laptops, MDM-enabled tablets, and personal smart devices. However, the administrator notices that some clients are failing all rules due to a lack of profile data. What should the administrator do to ensure these unprofiled clients can access the profiler collectors and receive a profile using best practices?
Submit