Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?