Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?
View the command and output shown in the exhibit.
What is the current state of this host?
Which two of the following are required for endpoint compliance monitors? (Choose two.)