Tracking moving dongles
Rogue devices can use dongles that were registered to clean hosts to access the network.
This guide will set up a policy to dead-end that rogue device.
Administrators should:
-
Follow the steps in this guide to set up the policy
-
Have persistent agent installed on all corporate endpoints