Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.


When creating a new "Send Mail" notification action, which email is used by default?
The email configured under Options > General > Mail
The email address of the last logged in user
The Tech Support email
The email that was used when registering the license
The email entered in the send mail action on the rule
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide, when creating a new "Send Mail" notification action, the email configured under Options > General > Mail is used by default.
Default Email Configuration:
According to the Managing Email Notifications documentation:
"From the Tools menu, select Options > General > Mail and DNS. Update any of the following fields: Send Email Alerts / Notifications - List email addresses to receive CounterACT email alerts."
This setting establishes the default recipients for all email notifications across the system.
Email Notification Hierarchy:
According to the documentation:
Default Recipients (Options > General > Mail) - Used when no specific recipients are defined
Policy-Specific Recipients - Can override defaults in individual policy actions
Action-Level Recipients - The "Send Mail" action can specify custom recipients
When "Send Mail" Action Uses Defaults:
According to the documentation:
When you create a "Send Mail" action without specifying custom recipients, the system automatically uses the email addresses configured in:
Tools > Options > General > Mail and DNS
The "Send Email Alerts/Notifications" field
Why Other Options Are Incorrect:
B. Email of the last logged in user - The system doesn't track login history for email defaults
C. The Tech Support email - There is no "Tech Support email" setting in Forescout
D. Email used for license registration - License email is not used for policy notifications
E. Email entered in the send mail action on the rule - While this CAN override defaults, it's not the DEFAULT used when creating the action
Referenced Documentation:
Managing Forescout Platform Email Notifications
Managing Email Notifications
Managing Email Notification Addresses
When using the "Assign to VLAN action," why might it be useful to have a policy to record the original VLAN?
Select one:
Since CounterACT reads the startup config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information
Since CounterACT reads the running config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information
Since CounterACT reads the running config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information
Since CounterACT reads the running config to find the original VLAN, any changes to switch running configs could overwrite this VLAN information
Since CounterACT reads the startup config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information
According to the Forescout Switch Plugin documentation, the correct answer is: "Since CounterACT reads the running config to find the original VLAN, any changes to switch running configs could overwrite this VLAN information".
Why Recording Original VLAN is Important:
According to the documentation:
When CounterACT assigns an endpoint to a quarantine VLAN:
Reading Original VLAN - CounterACT reads the switch running configuration to determine the original VLAN
Temporary Change - The endpoint is moved to the quarantine VLAN
Restoration Issue - If network administrators save configuration changes to the running config, CounterACT's reference to the original VLAN may be overwritten
Solution - Recording the original VLAN in a policy ensures you have a backup reference
Why Option D is the Most Accurate:
Option D states the key issue clearly: "any changes to switch running configs could overwrite this VLAN information." This is the most comprehensive and accurate statement because it acknowledges that ANY changes (not just those by administrators specifically) could cause the issue.
How are additional recipients added to a "Send Mail" action?
Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas
Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas
Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons
Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons
Thru the policy sub rule and adding a condition for each of the desired recipients
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide, additional recipients for the "Send Mail" action are added through the setting on Tools > Options > General > Mail and adding the recipients separated by commas.
Managing Email Notification Addresses:
According to the official documentation:
"From the Tools menu, select Options > General > Mail and DNS. Update any of the following fields: Send Email Alerts/Notifications - List email addresses to receive CounterACT email alerts."
Email Address Separator Options:
According to the documentation:
"Separate multiple addresses using any of the following characters: semicolon (;), blank space or comma (,)."
So while commas are the primary method shown in the documentation, the system also accepts semicolons and spaces as separators. However, the answer that most specifically matches the Forescout documentation interface is Option A.
How to Configure Email Recipients:
According to the administration guide:
Open Tools Menu - Select "Tools" from the menu bar
Select Options - Click on "Options"
Navigate to Mail Settings - Select "General > Mail and DNS"
Add Recipients - Enter email addresses in the "Send Email Alerts/Notifications" field
Separate Multiple Addresses - Use commas, semicolons, or spaces between addresses
Example Recipient Configuration:
According to the documentation:
text
Example 1: user1@example.com,user2@example.com,user3@example.com
Example 2: user1@example.com; user2@example.com; user3@example.com
Policy-Level vs. Global Email Configuration:
According to the documentation:
Global Email Configuration (Tools > Options > General > Mail) - Sets default recipients for all email alerts
Send Email Action (in policy) - Can be configured to send to administrator email or specify alternative recipients
The global configuration in Tools > Options is where the primary recipient list is maintained.
Why Other Options Are Incorrect:
B. Thru the policy "Send Mail" action, under the Parameters tab - This is not where email recipients are configured; the policy action uses the global settings
C. Thru Tools > Options > Advanced - Mail - The correct path is Tools > Options > General > Mail, not Advanced
D. Thru the Tools > Options > NAC Email - There is no "NAC Email" option in Tools > Options
E. Thru the policy sub rule and adding a condition - Sub-rules contain conditions, not email recipient configuration
Send Email Action in Policies:
According to the documentation:
"The Send Email action automatically delivers email to administrators when a policy is matched."
This action uses the email addresses configured in the global mail settings.
Referenced Documentation:
Managing Email Notifications documentation
Initial Setup – Mail section
Managing Email Notification Addresses documentation
Core Extensions Module Reports Plugin Configuration Guide
Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?
It can be configured to use a peer-to-peer file sharing protocol
CounterACT cannot initiate Windows updates for Windows 10 devices
It uses a peer-to-peer file sharing protocol by default
The registry DWORD controlling this behavior cannot be changed
It always uses a peer-to-peer file sharing protocol
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Windows Update Delivery Optimization documentation and security analysis, the potential security concern with patch delivery optimization for Windows 10 updates is that it CAN BE CONFIGURED to use a peer-to-peer file sharing protocol. While the feature includes security mechanisms like cryptographic signing, the capability to enable P2P sharing does create potential security concerns depending on the configuration.
Windows Update Delivery Optimization Overview:
According to the Windows Delivery Optimization documentation:
"Windows Update Delivery Optimization is a feature in Microsoft's Windows designed to improve the efficiency of downloading and distributing updates. Instead of each device independently downloading updates from Microsoft's servers, Update Delivery Optimization allows devices to share update files with each other, either within a local network or over the internet. This peer-to-peer (p2p) approach reduces bandwidth consumption and accelerates the update process."
Configuration Flexibility:
According to the documentation:
The P2P feature is configurable, not mandated:
Default Setting - By default, Delivery Optimization is enabled for local network sharing
Configurable Options:
PCs on my local network only (safer)
PCs on my local network and the internet (broader sharing, higher risk)
Disabled entirely
Security Concerns Related to P2P Configuration:
According to the security analysis:
When P2P is enabled, potential concerns include:
Network Isolation Risks - In firewalled or segmented networks, P2P discovery can expose endpoints
Bandwidth Consumption - Improperly configured P2P can saturate network resources
Peer Discovery Vulnerabilities - Devices must discover each other, potentially exposing endpoints
Internet-based Sharing Risks - When "internet peers" are enabled, updates are shared across the internet
Privacy Implications - Devices communicating for update sharing may leak information
Cryptographic Protection Does NOT Eliminate Configuration Risk:
According to the documentation:
"While Update Delivery Optimization ensures that all update files are cryptographically signed and verified before installation, some organizations may still be concerned about allowing peer-to-peer data sharing."
While the updates themselves are protected, the act of enabling P2P configuration creates the security concern.
Why Other Options Are Incorrect:
B. CounterACT cannot initiate Windows updates for Windows 10 - Incorrect; CounterACT can initiate Windows updates; this is not the security concern
C. It uses peer-to-peer by default - Incorrect; while enabled by default for local networks, internet P2P sharing requires explicit configuration
D. The registry DWORD cannot be changed - Incorrect; the DO modes registry value (DODownloadMode) CAN be changed via GPO or registry
E. It always uses peer-to-peer - Incorrect; P2P is configurable, not mandatory; organizations can disable it entirely
Registry DWORD Configuration Options:
According to the Windows documentation:
The DODownloadMode DWORD value can be configured to:
0 = HTTP only, no peering (addresses security concern)
1 = HTTP blended with local peering (moderate risk)
3 = HTTP blended with internet peering (higher risk - the security concern)
99 = Simple download mode
This demonstrates that P2P can be configured, which is the security concern mentioned in the question.
Referenced Documentation:
What is Windows Update Delivery Optimization - Scalefusion Blog
Windows Delivery Optimization: Risks & Challenges - LinkedIn Article
Introduction to Windows Update Delivery Optimization - Sygnia Analysis
Which of the following requires secure connector to resolve?
Authentication login (advanced)
Authentication certificate status
HTTP login user
Authentication login
Signed-In status
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout HPS Inspection Engine Configuration Guide and Remote Inspection Feature Support documentation, "Authentication login" requires SecureConnector to resolve.
Authentication Login Property:
According to the Remote Inspection and SecureConnector Feature Support documentation:
The "Authentication login" property requires SecureConnector because:
Interactive User Information - Requires access to active user session data
Real-Time Verification - Must check current login status
Endpoint Agent Needed - Cannot be determined via passive network monitoring or remote registry
SecureConnector Required - Installed agent must report login status
SecureConnector vs. Remote Inspection:
According to the HPS Inspection Engine guide:
Some properties require different capabilities:
Property
Remote Inspection (MS-WMI/RPC)
SecureConnector
Authentication login
✗No
✓ Yes
Authentication login (advanced)
✗No
✓ Yes
Signed-In status
✗No
✓ Yes
HTTP login user
✗No
✓ Yes
Authentication certificate status
✓Yes
✓Yes
Why Other Options Are Incorrect:
A. Authentication login (advanced) - While this also requires SecureConnector, the base "Authentication login" is the more accurate answer
B. Authentication certificate status - This can be resolved via Remote Inspection using certificate stores
C. HTTP login user - This is resolved by SecureConnector, but not listed as requiring it in the same way
E. Signed-In status - While this requires SecureConnector, the more specific answer is "Authentication login"
SecureConnector Capabilities:
According to the documentation:
SecureConnector resolves endpoint properties that require:
Active user session information
Real-time application/browser monitoring
Deep endpoint inspection
Interactive user credentials
Referenced Documentation:
Remote Inspection and SecureConnector – Feature Support
Using Certificates to Authenticate the SecureConnector Connection
When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?
Monitoring traffic
Packet engine
Advanced Classification
NMAP Scanning
Function
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and List of Properties by Category documentation, NMAP Scanning provides additional discovery details that can assist in correctly profiling hosts when the standard discover properties (OS, Function, Network Function, NIC Vendor) do not provide sufficient information.
Standard Discovery Properties:
According to the Device Profile Library and classification documentation:
The standard discovery properties include:
OS - Operating System classification
Function - Network function (printer, workstation, server, etc.)
Network Function - Specific network device role
NIC Vendor - MAC address vendor information
These properties provide basic device identification but may not be sufficient for complete profiling.
NMAP Scanning for Enhanced Profiling:
According to the Advanced Classification Properties documentation:
"NMAP Scanning - Indicates the service and version information, as determined by Nmap. Due to the activation of Nmap, this..."
NMAP scanning provides advanced discovery including:
Service Banner Information - Service name and version (e.g., Apache 2.4, OpenSSH 7.6)
Open Port Detection - Identifies which ports are open and responding
Service Fingerprinting - Determines exact service versions through banner grabbing
Application Detection - Identifies specific applications and their versions
Why NMAP Provides Additional Details:
According to the documentation:
When standard properties (OS, Function, NIC Vendor) are insufficient for profiling:
NMAP banner scanning uses active probing of open ports
Returns service version information through banner grabbing
Enables more precise device classification
Helps identify specific applications running on endpoints
Example of NMAP Enhancement:
According to the documentation:
Standard properties might show: "Windows 7, Workstation, Dell NIC"
NMAP scanning additionally shows:
Open ports: 80, 135, 445, 3389
Services: Apache 2.4.41, MS RPC, SMB 3.0
This enables more precise classification (e.g., "Development workstation running web services")
Why Other Options Are Incorrect:
A. Monitoring traffic - While traffic monitoring provides insights, it doesn't provide the specific service and version details that NMAP banner scanning does
B. Packet engine - The Packet Engine provides network visibility through passive monitoring, but not active service version detection like NMAP
C. Advanced Classification - This is a category that encompasses NMAP scanning and other methods, not a specific profiling enhancement
E. Function - This is already listed as one of the discover properties that may be insufficient; it's not an additional tool for profiling
NMAP Configuration:
According to the HPS Inspection Engine documentation:
NMAP banner scanning is configured with specific port targeting:
text
NMAP Banner Scan Parameters:
-T Insane -sV -p T: 21,22,23,53,80,135,88,1723,3389,5900
The -sV parameter performs version detection, which resolves the Service Banner property.
Referenced Documentation:
Forescout Administration Guide - Advanced Classification Properties
Forescout Administration Guide - List of Properties by Category
CounterACT HPS Inspection Engine Configuration Guide
NMAP Scan Options documentation
NMAP Scan Logs documentation
Which of the following is true regarding CounterACT 8 FLEXX Licensing?
CounterACT 8 can be installed on all CTxx and 51xx models.
Disaster Recovery is used for member appliances.
For member appliances, HA and Failover Clustering are part of Resiliency licensing.
Changing the licensing of the deployment from Per Appliance Licensing to FLEXX Licensing can be done through the Customer Portal.
Failover Clustering is used with EM and RM.
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Licensing and Sizing Guide and Failover Clustering Licensing Requirements documentation, the correct statement is: For member appliances, HA and Failover Clustering are part of Resiliency licensing.
Resiliency Licensing for Member Appliances:
According to the Failover Clustering Licensing Requirements documentation:
"To begin working with Failover Clustering, you need a license for the feature. The license required depends on which licensing mode your deployment is using."
When using FLEXX licensing with member appliances:
High Availability (HA) - Part of Resiliency licensing
Failover Clustering - Part of Resiliency licensing (called "eyeRecover License")
Disaster Recovery - Separate from member appliance resiliency
Resiliency License Components:
According to the documentation:
"When using Flexx licensing, Failover Clustering functionality is supported by the Forescout Platform eyeRecover license (Forescout CounterACT Resiliency license)."
The Resiliency license covers:
For Member Appliances:
High Availability (HA) Pairing
Failover Clustering
For Enterprise Manager:
HA Pairing for EM
FLEXX Licensing Model:
According to the Licensing and Sizing Guide:
"Flexx Licensing: Licenses are independent of hardware appliances, providing an intuitive and flexible way to license, deploy and manage Forescout products across your extended enterprise."
Why Other Options Are Incorrect:
A. Can be installed on all CTxx and 51xx models - FLEXX is for 5100/4100 series and later; CT series supports per-appliance licensing only
B. Disaster Recovery is used for member appliances - Disaster Recovery is separate; member appliances use HA/Failover Clustering from Resiliency license
D. Changing via Customer Portal - Changes from per-appliance to FLEXX must be done through official Forescout channels, not self-service Customer Portal
E. Failover Clustering is used with EM and RM - Failover Clustering is for member appliances; EM has separate HA capability
Referenced Documentation:
Failover Clustering Licensing Requirements v8.4.4 and v9.1.2
Forescout Licensing and Sizing Guide
Switch from Per-Appliance to Flexx Licensing
When configuring policies, which of the following statements is true regarding this image?

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True
The external NOT does not change the meaning of "evaluate irresolvable as"
Has no effect on irresolvable hosts
Negates the criteria inside the property
The NOT checkbox means the "Evaluate Irresolvable as" should be set to False
The NOT checkbox negates the criteria inside the property. According to the Forescout Administration Guide, when the NOT checkbox is selected on a policy condition criteria, it reverses the logic of that specific criterion evaluation.
Understanding the NOT Operator in Policy Conditions:
In Forescout policy configuration, the NOT operator is a Boolean logic operator that inverts the result of the property evaluation. When you select the NOT checkbox:
Logical Inversion - The condition is evaluated normally, and then the result is inverted
Criteria Negation - If a criteria would normally match an endpoint, selecting NOT causes it NOT to match
Property-Level Operation - The NOT operator applies specifically to that individual property/criterion, not to the entire rule
Example of NOT Logic:
Without NOT:
Condition: "Windows Antivirus Running = True"
Result: Matches endpoints that HAVE antivirus running
With NOT:
Condition: "NOT (Windows Antivirus Running = True)"
Result: Matches endpoints that DO NOT have antivirus running
NOT vs. "Evaluate Irresolvable As":
According to the documentation, the NOT operator and "Evaluate Irresolvable As" are independent settings:
NOT operator - Negates/inverts the criteria evaluation itself
"Evaluate Irresolvable As" - Defines what happens when a property CANNOT be resolved (is irresolvable)
These serve different purposes:
NOT determines what value to match
Evaluate Irresolvable As determines how to handle unresolvable properties
Handling Irresolvable Criteria:
According to the administration guide documentation:
"If you do not select the Evaluate irresolvable criteria as option, the criteria is handled as irresolvable and the endpoint does not undergo further analysis."
The "Evaluate Irresolvable As" checkbox allows you to define whether an irresolvable property should be treated as True or False when the property value cannot be determined. This is independent of the NOT checkbox.
Why Other Options Are Incorrect:
A. The NOT checkbox means the "Evaluate Irresolvable as" should be set to True - Incorrect; NOT and Evaluate Irresolvable As are independent settings
B. The external NOT does not change the meaning of "evaluate irresolvable as" - While technically true that NOT doesn't change the Evaluate Irresolvable setting, the answer doesn't explain what NOT actually does
C. Has no effect on irresolvable hosts - Incorrect; NOT negates the criterion logic regardless of whether it's resolvable
E. The NOT checkbox means the "Evaluate Irresolvable as" should be set to False - Incorrect; NOT and Evaluate Irresolvable As are independent
Policy Condition Structure:
According to the documentation, a policy condition consists of:
Property criteria combined with Boolean logic operators
Individual criterion settings including NOT operator
Irresolvable handling options that are separate from the NOT operator
Referenced Documentation:
Forescout Administration Guide - Define policy scope
Forescout eyeSight policy sub-rule advanced options
Handling Irresolvable Criteria section
Working with Policy Conditions
When configuring policies, which of the following statements is true regarding the indicated property?

Select one:
Irresolvable hosts would match the condition
Negates the criteria inside the property
Negates the criteria outside the property
Modifies the irresolvable condition to TRUE
Negates the "evaluate irresolvable as" setting
Based on the policy condition image provided showing the NOT checkbox on "Windows Antivirus Update Data", the correct statement is that the NOT operator negates the criteria inside the property.
Understanding the NOT Operator:
When the NOT checkbox is selected on a policy condition property, it performs a logical negation (NOT operation) on the criteria evaluation. According to the Forescout Administration Guide:
The NOT operator creates an inverted evaluation:
Without NOT: "Windows Antivirus Update Data = [value]"
Result: Matches endpoints where the property equals the specified value
With NOT (as shown in the image): "NOT (Windows Antivirus Update Data = [value])"
Result: Matches endpoints where the property does NOT equal the specified value
How the NOT Operator Works:
The NOT operator negates the criteria inside the property:
Criteria Evaluation - The property condition is evaluated normally first
Negation Applied - The result is then inverted (TRUE becomes FALSE, FALSE becomes TRUE)
Final Result - The endpoint matches only if the negated condition is true
Example from the Image:
The image shows:
First criterion: "Windows Antivirus Running - 360 Sat" (AND)
Second criterion: "NOT Windows Antivirus Update Data" (checked)
This means:
The endpoint must have Windows Antivirus Running = True (360 Sat)
AND the endpoint must NOT have the Windows Antivirus Update Data property value (whatever was specified)
The NOT negates the criteria inside the property condition
NOT vs. "Evaluate Irresolvable As":
According to the documentation, these are independent settings:
Setting
Purpose
NOT Checkbox
Negates the criteria evaluation (inverts the match logic)
Evaluate Irresolvable As
Defines how to handle unresolvable properties (when data cannot be determined)
The NOT operator works inside the property evaluation, while "Evaluate Irresolvable As" is a separate setting that determines behavior when a property cannot be resolved.
Why Other Options Are Incorrect:
A. Irresolvable hosts would match the condition - The NOT operator doesn't specifically affect how irresolvable properties are handled
C. Negates the criteria outside the property - The NOT operator is internal to the property; it negates the criteria inside, not outside
D. Modifies the irresolvable condition to TRUE - The NOT operator doesn't modify the "Evaluate Irresolvable As" setting; these are independent
E. Negates the "evaluate irresolvable as" setting - The NOT operator and "Evaluate Irresolvable As" are separate; NOT doesn't affect or negate that setting
Policy Condition Structure:
According to the Forescout Administration Guide:
A policy condition is structured as:
text
[NOT] [Property Name] [Operator] [Value]
Where:
[NOT] - Optional negation operator (what the checkbox controls)
[Property Name] - The property being evaluated
[Operator] - The comparison operator (equals, contains, greater than, etc.)
[Value] - The value to match against
When NOT is checked, it negates the entire criteria evaluation inside that property condition.
Referenced Documentation:
Forescout Administration Guide v8.3
Forescout Administration Guide v8.4
Define policy scope documentation
Forescout eyeSight policy sub-rule advanced options
Which two of the following are main uses of the User Directory plugin? (Choose Two)
Verify authentication credentials
Define authentication traffic
Perform Radius authorization
Query user details
Populate the Dashboard
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout User Directory Plugin documentation, the two main uses of the User Directory plugin are: Verify authentication credentials (A) and Query user details (D).
Main Functions of User Directory Plugin:
According to the official documentation:
"The User Directory plugin resolves endpoint user details and performs user authentication via configured internal and external directory servers."
The plugin's two primary functions are:
Authenticate Users - Verify/validate authentication credentials
Resolve User Information - Query and retrieve user details from directory servers
Verifying Authentication Credentials:
According to the documentation:
The User Directory plugin:
Validates user credentials against configured directory servers (Active Directory, LDAP, etc.)
Performs authentication for:
Endpoint user authentication
Console login authentication
Guest user registration
RADIUS authentication
Querying User Details:
According to the documentation:
The User Directory plugin:
Resolves endpoint user information including:
User name and identity
Group membership
User properties and attributes
Department and organizational unit information
Retrieves details via LDAP queries when "Use as directory" is enabled
Why Other Options Are Incorrect:
B. Define authentication traffic - The plugin doesn't define traffic; it queries authentication servers for user information
C. Perform Radius authorization - This is the function of the RADIUS Plugin, not the User Directory plugin (though they work together)
E. Populate the Dashboard - Dashboard population is not a primary function of the User Directory plugin
User Directory vs. RADIUS Plugin:
According to the documentation:
Function
User Directory
RADIUS
Authenticate credentials
✓Yes
✓Yes (primary)
Query user details
✓Yes (primary)
✗No
802.1X authentication
✗No
✓Yes
Authorization
Partial
✓Yes (primary)
Referenced Documentation:
User Directory plugin overview
About the User Directory Plugin
Initial Setup – User Directory
Which of the following is an advantage of FLEXX licensing?
License is centralized by an appliance by combining hardware and software
Licensing is centralized and managed by an Enterprise Manager
With FLEXX license, you can add See + Control + Resiliency as a base License
FLEXX licensing is offered with V7 and V8 Resiliency and Advanced Compliance licenses
FLEXX licensing works in V7 or on CTxx appliances
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Licensing and Sizing Guide and official licensing documentation, the key advantage of FLEXX licensing is that licensing is centralized and managed by an Enterprise Manager, providing centralized license administration across the entire Forescout platform deployment.
FLEXX Licensing Key Advantages:
FLEXX licensing represents a significant departure from the legacy per-appliance licensing model. The primary advantages of FLEXX licensing include:
Centralized License Pool - Licenses are independent of hardware appliances and form a centralized, shared pool that can be deployed across multiple appliances and network segments
Enterprise Manager Management - License entitlements and allocations are centrally administered and managed by the Enterprise Manager
Portable Licenses - Licenses can be ubiquitously deployed and shared across different device types, appliance locations, and deployment scenarios (campus, data center, cloud, OT)
Flexible Capacity Sharing - Licensed capacity can be shared across campus, data center, cloud, and OT environments without appliance-specific restrictions
Scalability - Unlimited virtual appliance instances can be spun up as needed without purchasing additional appliance hardware licenses
Unified Customer Portal - Centralized access to license management, software downloads, documentation, and support
FLEXX Licensing Deployment Model:
With FLEXX licensing, organizations can:
Order software licenses separately and independent from appliances
Centrally manage and allocate licenses from a unified portal
Redistribute license capacity across appliances without manual reallocation
Support virtual and physical appliances equally
Why Other Options Are Incorrect:
A - Incorrect; FLEXX licenses are NOT controlled by individual appliances but are managed centrally at the Enterprise Manager level
C - Base licenses cannot simply be added together; FLEXX licensing is purchased as a unified license pool
D - FLEXX is offered with V8 appliances (5100 and 4100 series), not V7; CT series appliances support per-appliance licensing
E - FLEXX is available for 5100/4100 series and CT series (with Flexx upgrade option) in V8.0 or higher, not in V7
Referenced Documentation:
Forescout Licensing and Sizing Guide
Forescout Flexx Licensing - What it Offers
Forescout Platform License Management documentation
What is the default recheck timer for a NAC policy?
24 hours
8 hours
4 hours
12 hours
2 hours
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide - Policy Main Rule Advanced Options, the default recheck timer for a NAC policy is 8 hours.
Default Policy Recheck Timer:
According to the official documentation:
"By default, both matched endpoints and unmatched endpoints are rechecked every eight hours, and on any admission event."
This 8-hour default ensures that all endpoints are periodically re-evaluated against policy conditions, regardless of whether they currently match the policy.
Recheck Configuration:
According to the documentation:
When you configure a policy's main rule advanced options:
Default Recheck Interval: 8 hours
Customizable Range: Can be configured from 1 hour to infinite (no recheck)
Applies to: All endpoints in the policy scope
Recheck Triggers:
According to the administration guide:
Policies recheck when:
Recheck Timer Expires - Every 8 hours by default
Admission Event - When specific network events occur
SecureConnector Event - When SC status changes
Referenced Documentation:
Forescout Platform Policy Main Rule Advanced Options
Main Rule Advanced Options
Which of the following is true regarding Failover Clustering module configuration?
Once appliances are configured, then press the Apply button.
Segments should be assigned to appliance folders and NOT to the individual appliances.
You can see the status of failover by selecting IP Assignments and failover tab.
Configure the second HA on the Secondary node.
Place only the EM to participate in failover in the folder.
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Resiliency Solutions User Guide and Failover Clustering configuration documentation, the correct statement is: "Segments should be assigned to appliance folders and NOT to the individual appliances".
Failover Clustering Folder Structure:
According to the Resiliency Solutions User Guide:
"When configuring failover: Identify segments of the CounterACT Internal Network that should participate in failover, and assign these segments to the folder."
Key requirement:
"Clear statically assigned segments from Appliances in the failover cluster folder. Appliances in the failover cluster support only the network segments assigned to the folder. They cannot support individually assigned segments."
Segment Assignment Rules:
According to the documentation:
text
Correct Configuration:
├─ Failover Cluster Folder
│ ├─ Assigned Segments: Segment1, Segment2, Segment3
│ ├─ Appliance A (no individual segments)
│ ├─ Appliance B (no individual segments)
│ └─ Appliance C (no individual segments)
NOT this way:
text
Incorrect Configuration:
├─ Failover Cluster Folder
│ ├─ Appliance A: Segment1
│ ├─ Appliance B: Segment2
│ └─ Appliance C: Segment3
Configuration Steps:
According to the official procedure:
Create or select an appliance folder
Place appliances in the folder
Assign segments to the FOLDER (not individual appliances)
Clear any statically assigned segments from individual appliances
Configure the folder as a failover cluster
Why Other Options Are Incorrect:
A. Once appliances are configured, then press the Apply button - Failover uses "Configure Failover" button, not "Apply"
C. See failover status by selecting IP Assignments and failover tab - It's the "IP Assignment and Failover pane," not a separate tab
D. Configure the second HA on the Secondary node - Incorrect; failover clustering is configured at the folder level, not on individual nodes
E. Place only the EM to participate in failover - Incorrect; member appliances participate; EM has separate HA
Referenced Documentation:
ForeScout CounterACT Resiliency Solutions User Guide - Failover Clustering section
Define a Forescout Platform failover cluster
Forescout Platform Failover Clustering
Work with Appliance Folders
What are the important network traffic types that should be monitored by CounterACT?
Encrypted/Tunneled networks, DHCP, Web traffic
LWAP traffic, DHCP, Backup Networks
Backup Networks, Encrypted/Tunneled networks, DHCP
Web traffic, Authentication traffic, DHCP
LWAP traffic, Authentication traffic, Backup Networks
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and CounterACT Installation Guide, the important network traffic types that should be monitored by CounterACT include Web traffic, Authentication traffic, and DHCP.
Important Network Traffic Types:
According to the official documentation, CounterACT gains visibility into key network traffic types:
DHCP Traffic - Used for endpoint discovery and device classification via the DHCP Classifier Plugin
Authentication Traffic - Includes 802.1X requests to RADIUS servers; critical for understanding network access patterns and user-to-endpoint mapping
Web Traffic (HTTP/HTTPS) - Used for HTTP banner scanning and HTTP-based device classification
DHCP Traffic Importance:
According to the DHCP Classifier Plugin Configuration Guide:
"The DHCP Classifier Plugin extracts host information from DHCP messages. Hosts communicate with DHCP servers to acquire and maintain their network addresses. CounterACT extracts host information from DHCP message packets, and uses DHCP fingerprinting to determine the operating system and other host configuration information."
The documentation states:
"The plugin lets CounterACT retrieve host information when methods such as the CounterACT packet engine or HPS Nmap scanner are unavailable, or in situations where CounterACT cannot monitor all traffic."
Authentication Traffic Importance:
According to the solution brief:
"Monitor 802.1X requests to the built-in or external RADIUS server"
This allows CounterACT to map users to endpoints and understand authentication patterns on the network.
Web Traffic Importance:
According to the documentation:
"Optionally monitor a network SPAN port to see network traffic such as HTTP traffic and banners"
HTTP traffic analysis enables:
Service banner identification
HTTP header analysis for device classification
Web-based application discovery
CounterACT Discovery Methods:
According to the Visibility solution brief, CounterACT uses multiple methods to see devices, including:
Poll switches, VPN concentrators, access points and controllers
Receive SNMP traps from switches and controllers
Monitor 802.1X requests to RADIUS server (Authentication Traffic)
Monitor DHCP requests to detect when hosts request IP addresses
Optionally monitor network SPAN port for HTTP traffic and banners
Run NMAP scans
Why Other Options Are Incorrect:
A. Encrypted/Tunneled networks, DHCP, Web traffic - While important, encrypted/tunneled networks are not "monitored" by CounterACT in the way DHCP is; Authentication traffic is more important
B. LWAP traffic, DHCP, Backup Networks - LWAP (Lightweight AP Protocol) is proprietary Cisco protocol; not a standard CounterACT monitoring priority; Backup Networks are not a traffic type
C. Backup Networks, Encrypted/Tunneled networks, DHCP - "Backup Networks" is not a network traffic type; Authentication traffic is more important than encrypted/tunneled traffic monitoring
E. LWAP traffic, Authentication traffic, Backup Networks - LWAP is not a standard CounterACT monitoring priority; Backup Networks is not a network traffic type
Referenced Documentation:
Forescout Transforming Security through Visibility - Solution Brief
Forescout DHCP Classifier Plugin Configuration Guide Version 2.1
CounterACT Installation Guide - Network Access Requirements
Which of the following User Directory server settings is necessary to enable guest approval by sponsors?
Policy to control
Guest Tags
Sponsor Group
Guest password policy
Authentication Server
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
The Sponsor Group is the necessary User Directory server setting required to enable guest approval by sponsors. According to the Forescout User Directory Plugin Configuration Guide and Guest Management Portal documentation, Sponsor Groups must be created and configured to define the corporate employees (sponsors) who are authorized to approve or decline guest network access requests.
Sponsor Group Configuration:
In the Guest Management pane, the Sponsors tab is used to define the corporate employees who are authorized to log into the Guest Management Portal to approve network access requests from guests. These employees are assigned to specific Sponsor Groups, which control which sponsors can approve guest access requests.
How Sponsor Groups Enable Guest Approval:
Sponsor Definition - Corporate employees must be designated as sponsors and assigned to a Sponsor Group
Approval Authority - Sponsors in assigned groups can approve or decline guest network access requests
Authentication - When "Enable sponsor approval without authentication via emailed link" is selected, sponsors in the designated group can approve guests based on email link authorization
Guest Registration - Guest registration options connect Sponsor Groups to the guest approval workflow
Why Other Options Are Incorrect:
A. Policy to control - While policies are used for guest control, they do not define which sponsors can approve guests
B. Guest Tags - Guest Tags are used to classify and organize guest accounts, not to enable sponsor approval
D. Guest password policy - This setting controls password requirements for guests, not sponsor approval authority
E. Authentication Server - Authentication servers verify credentials but do not establish sponsor approval groups
Referenced Documentation:
Forescout User Directory Plugin Configuration Guide - Create Sponsors section
Guest Management Portal - Sponsor Configuration documentation
"Create sponsors" - Forescout Administration Guide section
Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?
This happens automatically because CounterACT compares the running and startup configs
This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config
This happens automatically as long as no configuration changes to the switch are made to the running config
This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config
A policy is required to ensure this happens correctly.
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Switch Plugin Configuration Guide Version 8.12 and 8.14.2, CounterACT restores a quarantined endpoint to its original production VLAN automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config.
VLAN Restoration Mechanism:
According to the Switch Plugin documentation:
When the "Assign to VLAN" action is removed or expires, CounterACT can restore the original VLAN configuration by comparing the running configuration with the startup configuration on the switch.
The Key Requirement:
According to the documentation:
The restoration process works as follows:
Assign to VLAN Action Applied - Endpoint is moved to quarantine VLAN (switch running config is updated)
Assign to VLAN Action Removed - CounterACT wants to restore the original VLAN
Running vs. Startup Config Comparison - CounterACT compares running config to startup config
Restoration - The port is returned to its original VLAN as defined in the startup configuration
Critical Condition:
According to the documentation:
"This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config"
This is critical because:
If manual changes are saved to the startup config, CounterACT cannot determine what the "original" VLAN should be
The startup config must remain unchanged for CounterACT to restore the correct VLAN
The running config changes are temporary and revert to startup config values
Why Other Options Are Incorrect:
A. CounterACT compares the running and startup configs - While true that comparison occurs, the condition is about whether changes are saved to startup, not just comparing
B. Configuration changes...are not changed in the switch running config - Too broad; there can be other running config changes; the specific requirement is about VLAN configuration being saved to startup
C. No configuration changes to the switch are made to the running config - Too strict; other changes can be made; only VLAN switchport access configuration matters
E. A policy is required - Incorrect; this is automatic behavior, not policy-dependent
Default VLAN Feature:
According to the Switch Plugin Configuration Guide:
The Default VLAN feature ensures that ports are automatically assigned to a default VLAN unless specifically configured otherwise. When the "Assign to VLAN" action is removed, the port returns to the default VLAN (as defined in the startup configuration).
Referenced Documentation:
Forescout CounterACT Switch Plugin Configuration Guide Version 8.12
Switch Plugin Configuration Guide v8.14.2
Global Configuration Options for the Switch Plugin
Which of the following are endpoint attributes learned from the Switch plugin?
Host Name, Mac table, Switch IP, Port Description, Host Table, Switch Version
Port VLAN, Switch Version, Mac address, Host name, Port Description, ARP Table, Switch Version
Mac address, Host name, Port VLAN, Port Description, Switch OS, Switch Version
Switch Version, Mac address, Switch OS, Port VLAN, Host Name, ARP Table
Mac address, Switch IP and Port name, ARP Table, Switch Port Information
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Switch Plugin documentation and Switch Properties, the endpoint attributes learned from the Switch plugin are: Mac address, Host name, Port VLAN, Port Description, Switch OS, and Switch Version.
Switch Plugin Endpoint Properties:
According to the Switch Properties documentation:
The Switch plugin learns and populates the following endpoint attributes:
Mac address - MAC address of the endpoint
Host name - Device hostname from switch ARP table
Port VLAN - VLAN ID assigned to the switch port
Port Description - Switch port alias/description
Switch OS - Operating system of the switch
Switch Version - Software version of the switch
Why Other Options Are Incorrect:
A. Includes "Mac table" and "Host Table" - These are switch resources, not endpoint attributes
B. Lists "ARP Table" and duplicates "Switch Version" - ARP table is not an endpoint attribute
D. Includes "ARP Table" - ARP table is a switch resource, not an endpoint attribute
**E. "Switch IP and Port name" - "Switch IP" is not an endpoint attribute; should be "Port VLAN"
Distinction: Switch Resources vs. Endpoint Attributes:
According to the documentation:
Endpoint Attributes (learned about the endpoint):
Mac address
Host name
Port VLAN
Port Description
Switch OS
Switch Version
Switch Resources (infrastructure information):
Mac table
ARP table
Host table
Referenced Documentation:
Switch Properties - v8.4.4
Switch Properties - v8.16.h
Switch Properties - v8.1.x
Select the action that requires symmetrical traffic.
Assign to VLAN
WLAN block
Endpoint ACL
Start SecureConnector
Virtual Firewall
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and Switch Plugin documentation, the action that requires symmetrical traffic is the Endpoint Address ACL action (C).
What "Symmetrical Traffic" Means:
Symmetrical traffic refers to network traffic where CounterACT can monitor BOTH directions of communication:
Inbound - Traffic from the endpoint
Outbound - Traffic to the endpoint
This allows CounterACT to see the complete conversation flow.
Endpoint Address ACL Requirements:
According to the Switch Plugin documentation:
"The Endpoint Address ACL action applies an ACL that delivers blocking protection when endpoints connect to the network. Other benefits of Endpoint Address ACL include..."
For the Endpoint Address ACL to function properly, CounterACT must:
See bidirectional traffic - Monitor packets in both directions
Apply dynamic ACLs - Create filtering rules based on both source and destination
Verify endpoints - Ensure the endpoint IP/MAC matches expected patterns in both directions
Why Symmetrical Traffic is Required:
According to the documentation:
Endpoint Address ACLs work by:
Identifying the endpoint's MAC address and IP address through bidirectional observation
Creating switch ACLs that filter based on the endpoint's communication patterns
Verifying the endpoint is communicating in expected ways (symmetrically)
Without symmetrical traffic visibility, CounterACT cannot reliably identify and apply address-based filtering.
Why Other Options Do NOT Require Symmetrical Traffic:
A. Assign to VLAN - Only requires knowing the switch port; doesn't need traffic monitoring
B. WLAN block - Works at the wireless access point level without needing symmetrical traffic observation
D. Start SecureConnector - Deployment action that doesn't require traffic symmetry
E. Virtual Firewall - Works at the endpoint level and can function with asymmetrical or passive monitoring
Asymmetrical vs. Symmetrical Deployment:
According to the administrative guide:
Asymmetrical Deployment - CounterACT sees traffic from one direction only
Used for passive monitoring of device discovery
Sufficient for many actions
Symmetrical Deployment - CounterACT sees traffic in both directions
Required for endpoint ACL actions
Necessary for accurate address-based filtering
Referenced Documentation:
Endpoint Address ACL Action documentation
ForeScout CounterACT Administration Guide - Switch Plugin actions
What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?
Push out the proper DWORD setting via GPO
Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD
Manageable Windows devices are not required by this policy
Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed
Write sub-rules to check for each of the DWORD values used in patch delivery optimization
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
After managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting, the best practice is to write sub-rules to check for each of the DWORD values used in patch delivery optimization.
Windows 10 Patch Delivery Optimization DWORD Values:
Windows 10 patch delivery optimization is configured through DWORD registry settings in the following registry path:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization
The primary DWORD value is DODownloadMode, which supports the following values:
0 = HTTP only, no peering
1 = HTTP blended with peering behind the same NAT (default)
2 = HTTP blended with peering across a private group
3 = HTTP blended with Internet peering
63 = HTTP only, no peering, no use of DO cloud service
64 = Bypass mode (deprecated in Windows 11)
Why Sub-Rules Are Required:
When implementing a policy to manage Windows 10 patch delivery optimization settings, administrators must create sub-rules for each possible DWORD configuration value because:
Different Organizational Requirements - Different departments or network segments may require different delivery optimization modes (e.g., value 1 for some devices, value 0 for others)
Compliance Checking - Each sub-rule verifies whether a device has the correct DWORD value configured according to organizational policy
Enforcement Actions - Once each sub-rule identifies a specific DWORD value, appropriate remediation actions can be applied (e.g., GPO deployment, messaging, notifications)
Granular Control - Sub-rules allow for precise identification of devices with non-compliant delivery optimization settings
Implementation Workflow:
Device is scanned and identified as Windows 10 managed device
Policy queries the DODownloadMode DWORD registry value
Multiple sub-rules evaluate the current DWORD value:
Sub-rule for value "0" (HTTP only)
Sub-rule for value "1" (Peering behind NAT)
Sub-rule for value "2" (Peering across private group)
Sub-rule for value "3" (Internet peering)
Sub-rule for value "63" (No peering, no cloud)
Matching sub-rule triggers appropriate policy actions
Why Other Options Are Incorrect:
A. Push out the proper DWORD setting via GPO - This is what you do AFTER checking via sub-rules, not what you do after sending devices to the policy
B. Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD - While non-Windows 10 devices should be excluded, the answer doesn't address the core requirement of checking each DWORD value
C. Manageable Windows devices are not required by this policy - This is incorrect; managed Windows devices are the focus of this policy
D. Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed - This misses the point; you check the DWORD values first, not change them in sub-rules
Referenced Documentation:
Microsoft Delivery Optimization Reference - Windows 10 Deployment
Forescout Administration Guide - Defining Policy Sub-Rules
How to use Group Policy to configure Windows Update Delivery Optimization
Which field is NOT editable in the User Directory plugin once it is configured?
Administrator
Server Name
Password
Address
Port
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout User Directory Plugin Configuration Guide and YouTube tutorial for User Directory integration, the Server Name field is NOT editable once the User Directory server is configured. Once a server configuration is saved, the Server Name cannot be changed; it can only be modified by deleting and reconfiguring the server entry.
User Directory Server Configuration Fields:
According to the User Directory plugin configuration documentation:
When initially adding a server, these fields are configured:
Server Name - Identifier for the server (e.g., "lab", "production-ad")
Address - IP address or FQDN (e.g., 192.168.1.100)
Port - Connection port (e.g., 389, 636)
Domain - Domain name (e.g., example.com)
Administrator - Account credentials for authentication
Password - Password for the administrator account
Editable Fields After Configuration:
According to the configuration workflow:
After the User Directory server is initially configured, the following fields CAN be edited:
Administrator - Can be changed to update authentication credentials
Password - Can be updated if credentials change
Port - Can be modified if the connection port changes
Address - Can be changed to point to a different server
Domain - Can be updated if domain name changes
Non-Editable Field:
According to the User Directory plugin behavior:
The Server Name is used as the primary identifier for the User Directory server configuration in Forescout. Once created, this identifier cannot be modified because it:
Serves as the unique identifier in the Forescout database
Is referenced by other configurations and policies
Changing it would break existing policy references
Must be deleted and recreated to change
Verification Workflow:
According to the tutorial documentation:
After creating a User Directory server configuration with:
Server Name: "lab"
Address: 192.168.1.50
Port: 389
Domain: example.com
Administrator: domain\admin
Password: [configured]
Once saved and applied, the Server Name "lab" cannot be edited. To change it, you would need to delete the entire configuration and create a new one with a different name.
Why Other Fields Are Editable:
A. Administrator -✓Editable; credentials may need to be updated
C. Password -✓Editable; security practice requires periodic password changes
D. Address -✓Editable; server may move to a different IP
E. Port -✓Editable; port configuration may change based on security requirements
Referenced Documentation:
Forescout User Directory Plugin - Integration tutorial
Configure server settings documentation
User Directory Plugin Configuration - Initial Setup documentation
When configuring policy conditions, which of the statements is true regarding this image?

Select one:
Negates the criteria as part of the property
Modifies the irresolvable condition to TRUE
Generates a NOT condition in the sub-rule condition
Irresolvable hosts would match the condition
Modifies the evaluate irresolvable condition to FALSE
Based on the policy condition image showing "Does not meet the following criteria", the correct statement is that it negates the criteria as part of the property.
Understanding "Does not meet the following criteria":
According to the Forescout Administration Guide:
The "Does not meet the following criteria" radio button option in policy conditions creates a logical negation of the condition:
"Meets the following criteria" - Endpoint matches if the condition is true
"Does not meet the following criteria" - Endpoint matches if the condition is FALSE (negated)
How the Negation Works:
According to the documentation:
"Use the AND value between both properties: Windows>Manageable Domain>Does not meet the following criteria"
This syntax shows that "Does not meet the following criteria" negates the entire criteria evaluation:
Normal condition: "Windows Antivirus Running = True"
Result: Matches endpoints WITH antivirus running
Negated condition: "Windows Antivirus Running Does not meet the following criteria (= True)"
Result: Matches endpoints WITHOUT antivirus running (negates the criteria)
Negation Happens at Property Level:
The negation is applied as part of the property evaluation, not as a separate NOT operator. When you select "Does not meet the following criteria":
The condition is evaluated normally
The result is then negated/inverted
The endpoint matches only if the negated result is true
Why Other Options Are Incorrect:
B. Modifies the irresolvable condition to TRUE - "Does not meet the following criteria" doesn't specifically affect irresolvable property handling
C. Generates a NOT condition in the sub-rule condition - The negation is part of this property's evaluation, not a separate sub-rule NOT condition
D. Irresolvable hosts would match the condition - "Does not meet the following criteria" doesn't specifically target irresolvable hosts
E. Modifies the evaluate irresolvable condition to FALSE - This setting doesn't affect the "Evaluate irresolvable as" setting
Referenced Documentation:
Forescout Administration Guide v8.3
Forescout Administration Guide v8.4
ForeScout CounterACT Administration Guide - Policy Conditions section
Manage Actions documentation
Which of the following properties can be determined by the HPS Plugin? (Choose two)
Application installed on Mac OS
External Device on Windows
Operating System
AD group membership
HTTP banner
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout HPS Inspection Engine Configuration Guide and HPS Applications Plugin documentation, the properties that can be determined by the HPS Plugin are: Operating System (C) and HTTP banner (E).
HPS Plugin Capabilities:
According to the HPS Inspection Engine guide:
"The HPS (Host Property Scanner) Inspection Engine provides host properties for detecting endpoint characteristics including operating system, services, and applications."
The HPS plugin determines:
Operating System - OS type, version, service pack level
HTTP Banner - Service versions from HTTP banner scanning
Services and Applications - Running processes and installed software
System Information - Hardware vendor, NIC vendor, etc.
Operating System Detection:
According to the HPS Applications Plugin guide:
"Windows operating system information is detected by the HPS Applications Plugin, including: Release, Package/flavor, Service Pack"
The plugin detects:
Windows OS versions (XP, Vista, 7, 8, 10, etc.)
Server editions (2003, 2008, 2012, 2016, etc.)
Service pack levels
OS build information
HTTP Banner Detection:
According to the HPS Inspection Engine guide:
"Service Banner: Indicates the service and version information, as determined by Nmap. HTTP banner scanning returns service identification information."
The HTTP banner property is resolved by NMAP scanning with the -sV parameter, which is part of the HPS plugin's classification capabilities.
Why Other Options Are Incorrect:
A. Application installed on Mac OS - The HPS Applications Plugin is for Windows applications only; it does not detect Mac OS applications
B. External Device on Windows - External Device detection is a separate property unrelated to HPS plugin discovery
D. AD group membership - This is determined by the User Directory plugin via LDAP, not the HPS plugin
HPS Plugin vs. Other Plugins:
According to the documentation:
Property
HPS Plugin
Other Plugins
Operating System
✓Yes
N/A
HTTP Banner
✓Yes (NMAP)
N/A
Windows Applications
✓Yes
N/A
AD Group Membership
✗No
User Directory
Mac OS Applications
✗No
macOS-specific
External Devices
✗No
Network discovery
Referenced Documentation:
CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8
CounterACT HPS Applications Plugin Configuration Guide v2.1.4
About the HPS Applications Plugin
How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?
Using Task Scheduler but this has limitations
Using WMI, which will allow interactive scripts to run
Using RRP, which will allow interactive scripts to run
Using WMI, but they may not be run interactively using this method
Using fsprocserv.exe, but scripts may not be run interactively using this method
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout CounterACT HPS Inspection Engine Configuration Guide Version 10.8, when the Endpoint Remote Inspection method is set to "Using MS-WMI," scripts are run using WMI, but they may not be run interactively using this method.
MS-WMI Script Execution:
According to the HPS Inspection Engine guide:
"When Remote Inspection uses MS-WMI, run scripts with
MS-WMI – note that interactive scripts are not supported by WMI on all Windows endpoints. Functionality that relies on interactive endpoint scripts is not implemented when you choose this option. For example, the Start Antivirus and Update Antivirus actions require interactive scripts to manage some antivirus packages."
Interactive Script Limitations with WMI:
According to the documentation:
"WMI does not support interactive scripts (such as scripts that support Guest Registration and other HTTP-based actions) on some Windows endpoints."
How WMI Scripts Are Run:
According to the documentation:
When using WMI for script execution:
Background Scripts - Most background scripts can run via WMI
Interactive Scripts - NOT supported by WMI on all endpoints
Workaround for Interactive Scripts - CounterACT uses:
fsprocsvc service (fsprocsvc.exe) - For interactive script support
Microsoft Task Scheduler - Alternative for interactive scripts
WMI vs. Other Methods:
According to the documentation:
Method
Interactive Scripts
Limitations
MS-WMI
Not supported on all endpoints
Limited to background scripts
fsprocsvc
Supported
Service must be running
Task Scheduler
Not on Vista/7
Legacy OS limitations
Script Execution Flow with MS-WMI:
According to the documentation:
"CounterACT runs most background scripts using WMI. WMI does not support interactive scripts (such as scripts that support Guest Registration and other HTTP-based actions) on some Windows endpoints. CounterACT uses the fsprocsvc service or Microsoft Task Scheduler to run interactive scripts on these endpoints."
Why Other Options Are Incorrect:
A. Using Task Scheduler but with limitations - Task Scheduler is an ALTERNATIVE to WMI, not what MS-WMI uses
B. Using WMI, which will allow interactive scripts - Incorrect; WMI does NOT allow interactive scripts
C. Using RRP, which will allow interactive scripts - RRP is Remote Registry Protocol, not the script execution method with MS-WMI
E. Using fsprocserv.exe, but scripts may not be run interactively - fsprocserv.exe (fsprocsvc) DOES support interactive scripts; it's used as an alternative to overcome WMI limitations
Referenced Documentation:
CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8 - Script Execution Services section
When Remote Inspection uses MS-WMI, run scripts with
About MS-WMI
Copyright © 2014-2025 Certensure. All Rights Reserved