The most recent content from our members.
I need someone to explain how UDT and Rogue Endpoint detection should work. It seems miserably flawed to me and support is giving me the run around saying it's doing what it should be doing. If that is the case the product is severely crippled for our intended use case. Our plan was to use UDT to monitor rogue endpoints…
It looks like you're new here. Sign in or register to get started.