Forum

  • Is there authentication on that network? If so, how are the usernames and passwords provisioned, and how many people use it a day? In addition, if you get a legal notice complaining about the guest user on that network, how would you handle it? Do you have legal way around it, or do you keep logs to match individual users to flows?

    Thanks.

Page 1 of 1
  • 1