An administrator of iOS supervised devices has noticed that devices are checking in regularly but are failing the Last Compromised Scan compliance policy. The administrator is fine with having slight disruptions to users but does not want any interaction from the user to be required.
The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.
Which action m the Last Compromised Scan compliance policy should be used?
Lillian
3 months agoCherelle
3 months agoLilli
3 months agoOzell
4 months agoSelma
4 months agoBernadine
4 months agoCathern
4 months agoSalley
4 months agoViola
5 months agoSalley
5 months agoMohammad
5 months agoRima
5 months agoStefania
5 months agoMiesha
5 months agoBilly
5 months agoIsabelle
5 months agoAlyce
5 months agoLeonie
10 months agoEsteban
8 months agoWillodean
9 months agoNell
9 months agoJerry
10 months agoHeike
10 months agoPok
8 months agoBenedict
9 months agoAmmie
9 months agoFelice
10 months agoAllene
8 months agoAlease
9 months agoWilliam
9 months agoZita
9 months agoLavonna
10 months agoYoko
10 months agoTommy
10 months agoTwanna
9 months agoOrville
9 months agoOlive
9 months agoNadine
9 months agoDenny
11 months agoLavonna
11 months ago