多项选择题

A. enables automated threat response
B. enables noncompliant device access
C. enables endpoint posture enforcement
D. enables third-party client and server protocols