on 11-14-2019 10:20 AM - edited on 07-08-2020 03:16 PM by DawgsFan
Learn why it is important to configure two-factor authentication to protect sensitive resources.
The two-factor authentication can be used to protect sensitive assets or comply with regulatory requirements. This type of authentication comprises of something the end user knows (PIN or password) and something the end user has (such as hardware or software tokens). The Agent Config Two-Factor Authentication best practice check ensures two-factor authentication is being utilized.