When configuring policy conditions, which of the statements is true regarding this image?

Select one:
Negates the criteria as part of the property
Modifies the irresolvable condition to TRUE
Generates a NOT condition in the sub-rule condition
Irresolvable hosts would match the condition
Modifies the evaluate irresolvable condition to FALSE
Based on the policy condition image showing "Does not meet the following criteria", the correct statement is that it negates the criteria as part of the property.
Understanding "Does not meet the following criteria":
According to the Forescout Administration Guide:
The "Does not meet the following criteria" radio button option in policy conditions creates a logical negation of the condition:
"Meets the following criteria" - Endpoint matches if the condition is true
"Does not meet the following criteria" - Endpoint matches if the condition is FALSE (negated)
How the Negation Works:
According to the documentation:
"Use the AND value between both properties: Windows>Manageable Domain>Does not meet the following criteria"
This syntax shows that "Does not meet the following criteria" negates the entire criteria evaluation:
Normal condition: "Windows Antivirus Running = True"
Result: Matches endpoints WITH antivirus running
Negated condition: "Windows Antivirus Running Does not meet the following criteria (= True)"
Result: Matches endpoints WITHOUT antivirus running (negates the criteria)
Negation Happens at Property Level:
The negation is applied as part of the property evaluation, not as a separate NOT operator. When you select "Does not meet the following criteria":
The condition is evaluated normally
The result is then negated/inverted
The endpoint matches only if the negated result is true
Why Other Options Are Incorrect:
B. Modifies the irresolvable condition to TRUE - "Does not meet the following criteria" doesn't specifically affect irresolvable property handling
C. Generates a NOT condition in the sub-rule condition - The negation is part of this property's evaluation, not a separate sub-rule NOT condition
D. Irresolvable hosts would match the condition - "Does not meet the following criteria" doesn't specifically target irresolvable hosts
E. Modifies the evaluate irresolvable condition to FALSE - This setting doesn't affect the "Evaluate irresolvable as" setting
Referenced Documentation:
Forescout Administration Guide v8.3
Forescout Administration Guide v8.4
ForeScout CounterACT Administration Guide - Policy Conditions section
Manage Actions documentation
Which type of signed SSL Certificate file formats are compatible with CounterACT?
.Pfx/.p12, .Pfx/.p7
.p7b, .pem
.X.509, x.507
.Pckcs#7, .pckcs#12
.cer, .crt
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout CLI Reference - Generating CSRs and Importing Signed Certificates documentation, the SSL certificate file formats compatible with CounterACT are ".p7b" and ".pem".
Supported Certificate Formats:
According to the CLI Reference documentation:
"To import a certificate from DER or P7B formatted files, convert it to PEM file format. Then convert the PEM files to a single PFX file as described above."
This indicates that:
P7B format - Supported (PKCS#7 container format)
PEM format - Supported and widely used (ASCII-encoded format)
Certificate Format Conversion Process:
According to the documentation:
The standard import process is:
text
Original Format → Conversion → PEM Format → PFX Format → Import to CounterACT
├─ DER files → Convert → PEM
├─ P7B files → Convert → PEM
└─ PEM files → Direct use or convert to PFX
Why Other Options Are Incorrect:
A. .Pfx/.p12, .Pfx/.p7 - Pfx is the final format used, not input; p7 is not a standard format
C. .X.509, x.507 - X.509 is a standard (not a format); x.507 is not valid
D. .Pckcs#7, .pckcs#12 - Spelling is "PKCS," not "Pckcs"; these are standards, not file formats
E. .cer, .crt - These are certificate formats but not listed as directly compatible in the documentation
Certificate Import Workflow:
According to the documentation:
Compatible workflow formats:
Input Formats (that need conversion):
DER files → Convert to PEM
P7B files → Convert to PEM
CER files → Convert to PEM
Intermediate Format:
PEM (ASCII-encoded, universally compatible)
Final Format:
PFX (used for CounterACT import)
Referenced Documentation:
Generating CSRs and Importing Signed Certificates - CLI Reference
Import and Configure System Certificates
When creating a new "Send Mail" notification action, which email is used by default?
The email configured under Options > General > Mail
The email address of the last logged in user
The Tech Support email
The email that was used when registering the license
The email entered in the send mail action on the rule
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide, when creating a new "Send Mail" notification action, the email configured under Options > General > Mail is used by default.
Default Email Configuration:
According to the Managing Email Notifications documentation:
"From the Tools menu, select Options > General > Mail and DNS. Update any of the following fields: Send Email Alerts / Notifications - List email addresses to receive CounterACT email alerts."
This setting establishes the default recipients for all email notifications across the system.
Email Notification Hierarchy:
According to the documentation:
Default Recipients (Options > General > Mail) - Used when no specific recipients are defined
Policy-Specific Recipients - Can override defaults in individual policy actions
Action-Level Recipients - The "Send Mail" action can specify custom recipients
When "Send Mail" Action Uses Defaults:
According to the documentation:
When you create a "Send Mail" action without specifying custom recipients, the system automatically uses the email addresses configured in:
Tools > Options > General > Mail and DNS
The "Send Email Alerts/Notifications" field
Why Other Options Are Incorrect:
B. Email of the last logged in user - The system doesn't track login history for email defaults
C. The Tech Support email - There is no "Tech Support email" setting in Forescout
D. Email used for license registration - License email is not used for policy notifications
E. Email entered in the send mail action on the rule - While this CAN override defaults, it's not the DEFAULT used when creating the action
Referenced Documentation:
Managing Forescout Platform Email Notifications
Managing Email Notifications
Managing Email Notification Addresses
What is the best practice for order of sub rules?
Last rule should capture the highest number of endpoints
First rule should capture the lowest number of endpoints
Second rule should capture the highest number of endpoints
Last rule should not use a catch all
First rule should capture the highest number of endpoints
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and RADIUS Plugin Configuration Guide, the best practice for ordering sub-rules is that the first rule should capture the lowest number of endpoints.
Sub-Rule Evaluation Order:
According to the documentation:
"Endpoints are inspected against each sub-rule in the order listed. When an endpoint matches a sub-rule, subsequent sub-rules are not evaluated for that endpoint."
This sequential evaluation means that sub-rule order is critical to policy behavior.
Best Practice - Specific to General:
According to the guidelines:
The correct approach is to order sub-rules from most specific to least specific:
First Sub-Rules (Most Specific) - Should capture the lowest number of endpoints
Very specific criteria
Narrow scope
Handles edge cases and special conditions
Middle Sub-Rules - Broader criteria
More endpoints matched
General conditions
Last Sub-Rule (Most General) - Catch-all sub-rule
Lowest specificity
Highest number of endpoints
Handles remaining unmatched endpoints
Why Specific Rules First:
According to the documentation:
"When an endpoint is found to match a sub-rule, no subsequent rules are evaluated for the endpoint."
This "first match wins" behavior requires:
Most specific rules first - Ensure special cases are handled correctly
General rules last - Catch remaining endpoints that don't match specific criteria
Avoid premature matches - If a general rule appears first, specific rules never execute
Example Sub-Rule Ordering:
According to the RADIUS documentation:
text
Sub-Rule 1 (Most Specific, Lowest Count):
Condition: Windows 7 AND Antivirus NOT Running AND Not Encrypted
Lowest number of endpoints - specific conditions
Sub-Rule 2 (More General, Moderate Count):
Condition: Windows Endpoint AND Missing Patches
More endpoints - broader criteria
Sub-Rule 3 (Least Specific, Highest Count - Catch-All):
Condition: Windows Endpoint (Any)
Highest number - captures all remaining Windows endpoints
Why Other Options Are Incorrect:
A. Last rule should capture the highest number - While the last rule may capture many endpoints, the key best practice is about the FIRST rule capturing the LOWEST
C. Second rule should capture the highest number - Sub-rule order is specific to general, not based on position 2
D. Last rule should not use a catch-all - Best practice is that the LAST rule should be the catch-all
E. First rule should capture the highest number - This is the OPPOSITE of correct practice
Referenced Documentation:
Forescout RADIUS Plugin Configuration Guide v4.3 - Sub-Rules section
Defining Forescout Platform Policy Sub-Rules
Sub-Rule Advanced Options
Which field in the User Directory plugin should be configured for Active Directory subdomains?
Replicas
Address
Parent Groups
Domain Aliases
DNS Detection
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout User Directory Plugin Configuration Guide - Microsoft Active Directory Server Settings, the field that should be configured for Active Directory subdomains is "Domain Aliases".
Domain Aliases for Subdomains:
According to the Microsoft Active Directory Server Settings documentation:
"Configure the following additional server settings in the Directory and Additional Domain Aliases sections: Domain Aliases - Configure additional domain names that users can use to log in, such as subdomains."
Purpose of Domain Aliases:
According to the documentation:
Domain Aliases are used to specify:
Subdomains - Alternative domain names like subdomain.company.com
Alternative Domain Names - Other domain name variations
User Login Options - Additional domains users can use to authenticate
Alias Resolution - Maps aliases to the primary domain
Example Configuration:
For an organization with the primary domain company.com and subdomain accounts.company.com:
Domain Field - Set to: company.com
Domain Aliases Field - Add: accounts.company.com
This allows users from either domain to authenticate successfully.
Why Other Options Are Incorrect:
A. Replicas - Replicas configure redundant User Directory servers, not subdomains
B. Address - Address field specifies the server IP/FQDN, not domain aliases
C. Parent Groups - Parent Groups relate to group hierarchy, not domain subdomains
E. DNS Detection - DNS Detection is not a User Directory configuration field
Additional Domain Configuration:
According to the documentation:
text
Primary Configuration:
├─ Domain: company.com
├─ Domain Aliases: accounts.company.com
│ services.company.com
│ mail.company.com
└─ Port: 636 (default)
Referenced Documentation:
Microsoft Active Directory Server Settings
Define User Directory Servers - Domain Aliases section
Which two of the following are main uses of the User Directory plugin? (Choose Two)
Verify authentication credentials
Define authentication traffic
Perform Radius authorization
Query user details
Populate the Dashboard
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout User Directory Plugin documentation, the two main uses of the User Directory plugin are: Verify authentication credentials (A) and Query user details (D).
Main Functions of User Directory Plugin:
According to the official documentation:
"The User Directory plugin resolves endpoint user details and performs user authentication via configured internal and external directory servers."
The plugin's two primary functions are:
Authenticate Users - Verify/validate authentication credentials
Resolve User Information - Query and retrieve user details from directory servers
Verifying Authentication Credentials:
According to the documentation:
The User Directory plugin:
Validates user credentials against configured directory servers (Active Directory, LDAP, etc.)
Performs authentication for:
Endpoint user authentication
Console login authentication
Guest user registration
RADIUS authentication
Querying User Details:
According to the documentation:
The User Directory plugin:
Resolves endpoint user information including:
User name and identity
Group membership
User properties and attributes
Department and organizational unit information
Retrieves details via LDAP queries when "Use as directory" is enabled
Why Other Options Are Incorrect:
B. Define authentication traffic - The plugin doesn't define traffic; it queries authentication servers for user information
C. Perform Radius authorization - This is the function of the RADIUS Plugin, not the User Directory plugin (though they work together)
E. Populate the Dashboard - Dashboard population is not a primary function of the User Directory plugin
User Directory vs. RADIUS Plugin:
According to the documentation:
Function
User Directory
RADIUS
Authenticate credentials
✓Yes
✓Yes (primary)
Query user details
✓Yes (primary)
✗No
802.1X authentication
✗No
✓Yes
Authorization
Partial
✓Yes (primary)
Referenced Documentation:
User Directory plugin overview
About the User Directory Plugin
Initial Setup – User Directory
What Protocol does CounterACT use to verify the revocation status of certificates?
PKI Certificate Revocation Protocol (PCRP)
Online Certificate Status Protocol (OCSP)
Online Revocation Status Protocol (ORSP)
Certificate Revocation List Protocol (CRLP)
Certificate Revocation Protocol (CRP)
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Platform Administration Guide and Certificate Configuration documentation, Forescout uses the Online Certificate Status Protocol (OCSP) to verify the revocation status of certificates.
OCSP in Forescout:
According to the official Forescout documentation:
"You can also configure the use of Online Certificate Status Protocol (OCSP) and set up validation method failover between CRL and OCSP."
And further:
"The Forescout Platform supports certificate revocation lists (CRL) and Online Certificate Status Protocol (OCSP) for smart card authentication."
What OCSP Does:
According to the Wikipedia and Fortinet OCSP documentation:
"The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate."
OCSP provides:
Real-Time Status Verification - Checks current certificate revocation status
Request/Response Protocol - Sends a query to an OCSP responder
Revocation Status Response - Returns "good," "revoked," or "unknown"
Efficient Alternative to CRL - Smaller data payload than downloading full certificate revocation lists
How OCSP Works:
According to the OCSP documentation:
Request Sent - Client sends OCSP request to OCSP responder (server operated by CA)
Status Verification - Responder checks revocation status with trusted CA
Response Returned - Responder returns current status, revoked, or unknown
Decision Made - Application (like Forescout) accepts or rejects the certificate based on response
Forescout Smart Card Certificate Validation:
According to the Forescout documentation:
When using smart card authentication, Forescout:
Supports OCSP - Sends OCSP requests for certificate revocation status
Supports CRL - Also supports Certificate Revocation Lists as fallback
Failover Configuration - Can be configured to use OCSP with CRL fallback
OCSP vs. Certificate Revocation List (CRL):
According to the documentation:
Aspect
OCSP
CRL
Data Size
Smaller response
Larger list
Update Frequency
Real-time status
Periodic updates
Network Load
Lower burden
Higher burden
Timeliness
Current status
Potentially outdated
Processing
Less complex
More complex parsing
Forescout uses OCSP because it provides real-time, efficient certificate status verification.
Why Other Options Are Incorrect:
A. PKI Certificate Revocation Protocol (PCRP) - This is not a standard protocol; PCRP does not exist
C. Online Revocation Status Protocol (ORSP) - This is not the correct name; the protocol is OCSP, not ORSP
D. Certificate Revocation List Protocol (CRLP) - While Forescout supports CRL, the primary protocol for real-time status is OCSP
E. Certificate Revocation Protocol (CRP) - This is not a standard protocol; the correct protocol is OCSP
Referenced Documentation:
Smart Card Certificate Configuration for Forescout Platform
Using Forescout Platform Smart Card Authentication
Client-Server Connection documentation
Audit Actions - OCSP for Syslog validation
Online Certificate Status Protocol (OCSP) - Wikipedia
What Is Online Certificate Status Protocol (OCSP) - Fortinet
What is NOT an admission event?
DHCP Request
IP Address Change
Host becomes offline
Login to an authentication server
New VPN user
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide, "Host becomes offline" is NOT an admission event. Admission events are triggers that cause policy rechecks, and according to the documentation:
What IS an Admission Event:
According to the official documentation:
"An admission event is a trigger that causes policies to be rechecked. Examples of admission events include:
DHCP Request
IP Address Change
Switch Port Change
Authentication via RADIUS or other authentication servers
Login to an authentication server
New VPN user"
Specific Admission Events Listed:
According to the Policy Main Rule Advanced Options documentation:
Admission events include:
DHCP Request - When an endpoint sends a DHCP request
IP Address Change - When an endpoint's IP address changes
Switch Port Change - When an endpoint moves to a different switch port
Authentication Events - When endpoints authenticate to RADIUS or other servers
VPN Events - When VPN users connect
Why "Host becomes offline" is NOT an Admission Event:
According to the documentation:
A host becoming offline is NOT listed as an admission event. Instead, policies handle offline hosts differently:
By default, policies are rechecked every 8 hours regardless of online/offline status
Offline detection is a property state change, not an admission event
The system tracks whether a host was "seen" or is currently "online," but this doesn't trigger admission event rechecks
Why Other Options ARE Admission Events:
A. DHCP Request ✓- Explicitly listed admission event
B. IP Address Change ✓- Explicitly listed admission event
D. Login to an authentication server ✓- Explicitly listed admission event
E. New VPN user ✓- Explicitly listed admission event
Referenced Documentation:
Forescout eyeSight policy main rule advanced options
Working with Policy Templates - When Are Policies Run
Event Properties documentation
How are additional recipients added to a "Send Mail" action?
Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas
Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas
Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons
Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons
Thru the policy sub rule and adding a condition for each of the desired recipients
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide, additional recipients for the "Send Mail" action are added through the setting on Tools > Options > General > Mail and adding the recipients separated by commas.
Managing Email Notification Addresses:
According to the official documentation:
"From the Tools menu, select Options > General > Mail and DNS. Update any of the following fields: Send Email Alerts/Notifications - List email addresses to receive CounterACT email alerts."
Email Address Separator Options:
According to the documentation:
"Separate multiple addresses using any of the following characters: semicolon (;), blank space or comma (,)."
So while commas are the primary method shown in the documentation, the system also accepts semicolons and spaces as separators. However, the answer that most specifically matches the Forescout documentation interface is Option A.
How to Configure Email Recipients:
According to the administration guide:
Open Tools Menu - Select "Tools" from the menu bar
Select Options - Click on "Options"
Navigate to Mail Settings - Select "General > Mail and DNS"
Add Recipients - Enter email addresses in the "Send Email Alerts/Notifications" field
Separate Multiple Addresses - Use commas, semicolons, or spaces between addresses
Example Recipient Configuration:
According to the documentation:
text
Example 1: user1@example.com,user2@example.com,user3@example.com
Example 2: user1@example.com; user2@example.com; user3@example.com
Policy-Level vs. Global Email Configuration:
According to the documentation:
Global Email Configuration (Tools > Options > General > Mail) - Sets default recipients for all email alerts
Send Email Action (in policy) - Can be configured to send to administrator email or specify alternative recipients
The global configuration in Tools > Options is where the primary recipient list is maintained.
Why Other Options Are Incorrect:
B. Thru the policy "Send Mail" action, under the Parameters tab - This is not where email recipients are configured; the policy action uses the global settings
C. Thru Tools > Options > Advanced - Mail - The correct path is Tools > Options > General > Mail, not Advanced
D. Thru the Tools > Options > NAC Email - There is no "NAC Email" option in Tools > Options
E. Thru the policy sub rule and adding a condition - Sub-rules contain conditions, not email recipient configuration
Send Email Action in Policies:
According to the documentation:
"The Send Email action automatically delivers email to administrators when a policy is matched."
This action uses the email addresses configured in the global mail settings.
Referenced Documentation:
Managing Email Notifications documentation
Initial Setup – Mail section
Managing Email Notification Addresses documentation
Core Extensions Module Reports Plugin Configuration Guide
What is required for CounterAct to parse DHCP traffic?
Must see symmetrical traffic
The enterprise manager must see DHCP traffic
DNS client must be running
DHCP classifier must be running
Plugin located in Network module
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout DHCP Classifier Plugin Configuration Guide Version 2.1, the DHCP Classifier Plugin must be running for CounterACT to parse DHCP traffic. The documentation explicitly states:
"For endpoint DHCP classification, the DHCP Classifier Plugin must be running on a CounterACT device capable of receiving the DHCP client requests."
DHCP Classifier Plugin Function:
The DHCP Classifier Plugin is a component of the Forescout Core Extensions Module. According to the official documentation:
"The DHCP Classifier Plugin extracts host information from DHCP messages. Hosts communicate with DHCP servers to acquire and maintain their network addresses. CounterACT extracts host information from DHCP message packets, and uses DHCP fingerprinting to determine the operating system and other host configuration information."
How the DHCP Classifier Plugin Works:
According to the configuration guide:
Plugin is Passive - "The plugin is passive, and does not intervene with the underlying DHCP exchange"
Inspects Client Requests - "It inspects the client request messages (DHCP fingerprint) to propagate DHCP information about the connected client to CounterACT"
Extracts Properties - Extracts properties like:
Operating system fingerprint
Device hostname
Vendor/device class information
Other host configuration data
DHCP Traffic Detection Methods:
The DHCP Classifier Plugin can detect DHCP traffic through multiple methods:
Direct Monitoring - The CounterACT device monitors DHCP broadcast messages from the same IP subnet
Mirrored Traffic - Receives mirrored traffic from DHCP directly
Replicated Messages - Receives DHCP requests forwarded/replicated from network devices
DHCP Relay Configuration - Receives explicitly relayed DHCP requests from DHCP relays
Plugin Requirements:
According to the documentation:
"No plugin configuration is required."
However, the plugin must be running on at least one CounterACT device for DHCP parsing to occur.
Why Other Options Are Incorrect:
A. Must see symmetrical traffic - While symmetrical network monitoring helps, it's not the requirement; the specific requirement is that the DHCP Classifier Plugin must be running
B. The enterprise manager must see DHCP traffic - Any CounterACT device capable of receiving DHCP traffic can parse it, not just the Enterprise Manager
C. DNS client must be running - DNS services are not required for DHCP parsing; they are separate services
E. Plugin located in Network module - The DHCP Classifier Plugin is part of the Core Extensions Module, not the Network module
DHCP Classifier Plugin as Part of Core Extensions Module:
According to the documentation:
"DHCP Classifier Plugin: Extracts host information from DHCP messages."
The DHCP Classifier Plugin is installed with and part of the Forescout Core Extensions Module, which includes multiple components:
Advanced Tools Plugin
CEF Plugin
DHCP Classifier Plugin
DNS Client Plugin
Device Classification Engine
And others
Referenced Documentation:
Forescout DHCP Classifier Plugin Configuration Guide Version 2.1
About the DHCP Classifier Plugin documentation
Port Mirroring Information Based on Specific Protocols
Forescout Platform Base Modules
