Forescout FSCP - Forescout Certified Professional Exam
If the condition of a sub-rule in your policy is looking for Windows Antivirus updates, how should the scope and main rule read?
Scope "all ips", filter by group blank, main rule member of group "Windows"
Scope "corporate range", filter by group "None", main rule "member of Group = Windows"
Scope "threat exemptions", filter by group "windows managed", main rule "member of group = windows"
Scope "corporate range", filter by group "windows managed", main rule "No conditions"
Scope "all ips", filter by group "windows", main rule "No Conditions"
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide - Define Policy Scope documentation and Windows Update Compliance Template configuration, when the condition of a sub-rule is looking for Windows Antivirus updates, the scope and main rule should read: Scope "corporate range", filter by group "windows managed", main rule "No conditions".​
Policy Scope Definition:
According to the policy scope documentation:​
When defining the scope for a Windows Antivirus/Updates policy:
Scope - Should be set to "corporate range" (endpoints within the corporate IP address range)
Filter by group - Should filter by the "windows managed" group (Windows endpoints that are manageable)
Main rule - Should have "No conditions" (meaning the policy applies to all endpoints matching the scope and group)
Why "No conditions" for the Main Rule:
According to the Windows Update Compliance Template documentation:​
The main rule is designed to be:
Broad in scope - Applies to all eligible Windows managed endpoints
Without specific conditions - Specific conditions are handled by sub-rules
Efficient filtering - The scope and group filter do the initial endpoint selection
The sub-rules then contain the specific conditions (e.g., "Windows Antivirus Update Date < 30 days ago") to evaluate each endpoint's compliance.
Policy Structure for Windows Updates:
According to the documentation:​
text
Policy Scope: "Corporate Range"
Filter by Group: "windows managed"
Main Rule: "No Conditions"
├─ Sub-rule 1: "Windows Antivirus Update Date > 30 days"
│ Action: Trigger update
├─ Sub-rule 2: "Windows Antivirus Running = False"
│ Action: Start Antivirus Service
└─ Sub-rule 3: "Windows Updates Missing = True"
Action: Initiate Windows Updates
"Windows Managed" Group:
According to the policy template documentation:​
The "windows managed" group specifically includes:
Windows endpoints that can be remotely managed
Endpoints with proper connectivity to management services
Systems with necessary admin accounts configured
Machines capable of executing remote scripts and commands
Why Other Options Are Incorrect:
A. Scope "all ips", filter by group blank, main rule member of group "Windows"Â - Too broad scope (includes non-Windows systems); "all ips" is inefficient
B. Scope "corporate range", filter by group "None", main rule "member of Group = Windows"Â - Correct scope and filtering wrong (should filter by group, not in main rule)
C. Scope "threat exemptions", filter by group "windows managed", main rule "member of group = windows"Â - Wrong scope (threat exemptions is for excluding systems); redundant main rule
E. Scope "all ips", filter by group "windows", main rule "No Conditions"Â - Too broad initial scope; "all ips" is inefficient and includes non-corporate systems
Recommended Policy Configuration:
According to the documentation:​
For Windows Antivirus/Updates policies:
Scope - Define as "corporate range" to limit to organizational endpoints
Filter by Group - Set to "windows managed" to exclude non-manageable systems
Main Rule - Set to "No conditions" for simplicity; let scope/group do the filtering
Sub-rules - Define specific compliance conditions (e.g., patch level, antivirus status)
This structure ensures:
Efficient policy evaluation
Only applicable Windows endpoints are assessed
Manageable systems are prioritized
Specific compliance checks occur in sub-rules
Referenced Documentation:
Define Policy Scope documentation​
Windows Update Compliance Template v2​
Defining a Policy Main Rule​
Which of the following actions can be performed with Remote Inspection?
Set Registry Key, Disable dual homing
Send Balloon Notification, Send email to user
Disable External Device, Start Windows Updates
Start Secure Connector, Attempt to open a browser at the endpoint
Endpoint Address ACL, Assign to VLAN
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout HPS Inspection Engine Configuration Guide Version 10.8 and the Remote Inspection and SecureConnector Feature Support documentation, the actions that can be performed with Remote Inspection include "Start Secure Connector" and "Attempt to open a browser at the endpoint".​
Remote Inspection Capabilities:
According to the documentation, Remote Inspection uses WMI and other standard domain/host management protocols to query the endpoint, and to run scripts and implement remediation actions on the endpoint. Remote Inspection is agentless and does not install any applications on the endpoint.​
Actions Supported by Remote Inspection:
According to the HPS Inspection Engine Configuration Guide:​
The Remote Inspection Feature Support table lists numerous actions that are supported by Remote Inspection, including:
Set Registry Key -✓Supported by Remote Inspection​
Start SecureConnector -✓Supported by Remote Inspection​
Attempt to Open Browser -✓Supported by Remote Inspection​
Send Balloon Notification -✓Supported (requires SecureConnector; can also be used with Remote Inspection)​
Start Windows Updates -✓Supported by Remote Inspection​
Send Email to User -✓Supported action
However, the question asks which actions appear together in one option, and Option D correctly combines two legitimate Remote Inspection actions: "Start Secure Connector" and "Attempt to open a browser at the endpoint".
Start SecureConnector Action:
According to the documentation:​
"Start SecureConnector installs SecureConnector on the endpoint, enabling future management via SecureConnector"
This is a supported Remote Inspection action that can deploy SecureConnector to endpoints.
Attempt to Open Browser Action:
According to the HPS Inspection Engine guide:​
"Opening a browser window" is a supported Remote Inspection action
However, there are limitations documented:​
"Opening a browser window does not work on Windows Vista and Windows 7 if the HPS remote inspection is configured to work as a Scheduled Task"
"When redirected with this option checked, the browser does not open automatically and relies on the packet engine seeing this traffic"
Why Other Options Are Incorrect:
A. Set Registry Key, Disable dual homing - While Set Registry Key is supported, "Disable dual homing" is not a standard Remote Inspection action
B. Send Balloon Notification, Send email to user - Both are notification actions, but the question seeks Remote Inspection-specific endpoint actions; these are general notification actions not specific to Remote Inspection
C. Disable External Device, Start Windows Updates - While Start Windows Updates is supported by Remote Inspection, "Disable External Device" is not a Remote Inspection action; it's a network device action
E. Endpoint Address ACL, Assign to VLAN - These are Switch plugin actions, not Remote Inspection actions; they work on network device level, not endpoint level
Remote Inspection vs. SecureConnector vs. Switch Actions:
According to the documentation:​
Remote Inspection Actions (on endpoints):
Set Registry Key on Windows
Start Windows Updates
Start Antivirus
Update Antivirus
Attempt to open browser at endpoint
Start SecureConnector (to deploy SecureConnector)
Switch Actions (on network devices):
Endpoint Address ACL
Access Port ACL
Assign to VLAN
Switch Block
Referenced Documentation:
Forescout CounterACT Endpoint Module HPS Inspection Engine Configuration Guide Version 10.8​
Remote Inspection and SecureConnector – Feature Support documentation​
Set Registry Key on Windows action documentation​
Start Windows Updates action documentation​
Send Balloon Notification documentation
Which of the following must be configured in the User Directory plugin to allow active directory credentials to authenticate console logins?
Include Parent groups
Authentication
Use as directory
Target Group Resolution
Use for console login
The Answer Is:
EExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout User Directory Plugin Configuration Guide, to allow Active Directory credentials to authenticate console logins, the "Use for console login" option must be configured.​
Three Key Checkboxes in User Directory Configuration:
According to the User Directory plugin documentation:​
When configuring a User Directory server (such as Active Directory), three important checkboxes are available:
Use as directory - Allows LDAP queries for user information
Use for authentication - Allows user authentication via AD credentials
Use for console login - Allows AD credentials to authenticate console logins
"Use for console login" Purpose:
According to the documentation:​
"When checked, this option enables Forescout Console administrators to log in using their Active Directory (or other configured directory server) credentials."
This checkbox specifically enables:
Administrators to use their Active Directory usernames and passwords
Console authentication via the configured directory server
Elimination of the need for separate Forescout Console accounts
Separate Functions of Each Checkbox:
According to the configuration guide:​
Checkbox
Purpose
Use as directory
LDAP queries for user properties and group membership
Use for authentication
802.1X, RADIUS, and other authentication protocols
Use for console login
Console login authentication for Forescout administrators
Each serves a distinct purpose and must be configured independently.
Why Other Options Are Incorrect:
A. Include Parent groups - This relates to group hierarchy, not console login authentication
B. Authentication - This is the protocol/method name, not a specific configuration checkbox
C. Use as directory - This enables LDAP queries for user information, not console login authentication
D. Target Group Resolution - This is not a standard configuration option for User Directory plugins
Console Login Workflow with Active Directory:
According to the documentation:
When "Use for console login" is enabled:
Administrator enters username and password at Forescout Console login screen
Credentials are sent to the configured Active Directory server
Active Directory validates the credentials
If valid, administrator is granted console access
No separate Forescout password needed
Referenced Documentation:
User Directory Plugin - Name and Type Step configuration​
User Directory readiness section
User Directory server configuration documentation
Which of the following statements is true regarding Layer-2 channel?
Recommended when there are a large number of VLANs
Response interface is a VLAN trunk
Monitor interface is a trunk
Utilizes two interfaces
Appliance monitor interface must be connected to an access layer switch
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Installation Guide and Working with Appliance Channel Assignments documentation, a Layer-2 channel "Utilizes two interfaces" - one monitor interface and one response interface.​
Layer-2 Channel Structure:
According to the documentation:​
"A channel defines a pair of interfaces used by the Appliance to protect your network. In general, one interface monitors traffic going through the network (the monitor interface), and the other responds to traffic on the network (the response interface)."
Two Interface Components:
According to the Installation Guide:​
Monitor Interface:
Monitors and tracks network traffic
Traffic is mirrored from switch ports
No IP address required
Can be any available interface
Response Interface:
Responds to monitored traffic
Used for policy actions and protections
Configuration depends on VLAN tagging
Can be same VLAN or trunk configuration
Layer-2 vs. Layer-3 Channel:
According to the documentation:​
Layer-2 Channel - Two interfaces (monitor and response)
Layer-3 Channel - Uses IP layer for response
Why Other Options Are Incorrect:
A. Recommended for large number of VLANs - Actually, Layer-2 channels with VLAN tagging are recommended for multiple VLANs, but this doesn't define what a Layer-2 channel is
B. Response interface is a VLAN trunk - While response interface CAN be a trunk for multiple VLANs, it's not required for all configurations
C. Monitor interface is a trunk - The monitor interface receives mirrored traffic; trunk configuration depends on VLAN setup
E. Must be connected to access layer switch - The appliance can connect to various switch types; not specifically limited to access layer
Referenced Documentation:
Working with Appliance Channel Assignments​
Quick Installation Guide v8.4​
Quick Installation Guide v8.2​
Add Channels​
Monitor Interface​
Set up the Forescout Platform Network​
Select the action that requires symmetrical traffic.
Assign to VLAN
WLAN block
Endpoint ACL
Start SecureConnector
Virtual Firewall
The Answer Is:
CExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and Switch Plugin documentation, the action that requires symmetrical traffic is the Endpoint Address ACL action (C).​
What "Symmetrical Traffic" Means:
Symmetrical traffic refers to network traffic where CounterACT can monitor BOTH directions of communication:
Inbound - Traffic from the endpoint
Outbound - Traffic to the endpoint
This allows CounterACT to see the complete conversation flow.
Endpoint Address ACL Requirements:
According to the Switch Plugin documentation:​
"The Endpoint Address ACL action applies an ACL that delivers blocking protection when endpoints connect to the network. Other benefits of Endpoint Address ACL include..."
For the Endpoint Address ACL to function properly, CounterACT must:
See bidirectional traffic - Monitor packets in both directions
Apply dynamic ACLs - Create filtering rules based on both source and destination
Verify endpoints - Ensure the endpoint IP/MAC matches expected patterns in both directions
Why Symmetrical Traffic is Required:
According to the documentation:​
Endpoint Address ACLs work by:
Identifying the endpoint's MAC address and IP address through bidirectional observation
Creating switch ACLs that filter based on the endpoint's communication patterns
Verifying the endpoint is communicating in expected ways (symmetrically)
Without symmetrical traffic visibility, CounterACT cannot reliably identify and apply address-based filtering.
Why Other Options Do NOT Require Symmetrical Traffic:
A. Assign to VLANÂ - Only requires knowing the switch port; doesn't need traffic monitoring
B. WLAN block - Works at the wireless access point level without needing symmetrical traffic observation
D. Start SecureConnector - Deployment action that doesn't require traffic symmetry
E. Virtual Firewall - Works at the endpoint level and can function with asymmetrical or passive monitoring
Asymmetrical vs. Symmetrical Deployment:
According to the administrative guide:​
Asymmetrical Deployment - CounterACT sees traffic from one direction only
Used for passive monitoring of device discovery
Sufficient for many actions
Symmetrical Deployment - CounterACT sees traffic in both directions
Required for endpoint ACL actions
Necessary for accurate address-based filtering
Referenced Documentation:
Endpoint Address ACL Action documentation​
ForeScout CounterACT Administration Guide - Switch Plugin actions​
Updates to the Device Profile Library may impact a device's classification if the device was classified using:
Advanced Classification
External Devices
Client Certificates
HTTP Banner
Guest Registration
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Device Profile Library Configuration Guide, the Device Profile Library uses HTTP Banner (along with other properties like DHCP hostname, NIC vendor, and NMAP scan results) as key classification properties. When the Device Profile Library is updated, devices that were originally classified using HTTP Banner properties will be re-classified based on the new or updated profiles in the library.​
Device Profile Library Function:
The Device Profile Library is a Content Module that delivers a library of pre-defined device classification profiles, each composed of properties and corresponding values that match a specific device type. According to the official documentation:​
"Each profile maps to a combination of values for function, operating system, and/or vendor & model. For example, the profile defined for Apple iPad considers the set of properties which includes the hostname of the device revealed by DHCP traffic, the HTTP banner, the NIC vendor and Nmap scan results."
How Updates Impact Classification:
According to the documentation:​
Library Updates - The Device Profile Library is periodically upgraded to improve classification accuracy and provide better coverage
Profile Changes - Updated profiles may change the properties used for classification or adjust matching criteria
Reclassification - When devices that rely on HTTP Banner information (or other matching properties in profiles) are re-evaluated against new profiles, their classification may change
Pending Changes - After a new version of the Device Profile Library is installed, devices show "pending classification changes" that can be reviewed before applying
Classification Properties in Device Profile Library:
According to the configuration guide, each device profile uses multiple properties including:​
HTTP Banner - Information about web services running on the device (e.g., Apache 2.4, IIS 10.0)
DHCP Hostname - Device name revealed in DHCP traffic
NIC Vendor - MAC address vendor information
NMAP Scan Results - Open ports and services detected
When the Device Profile Library is updated, devices that were classified using these properties may be re-classified.
Why Other Options Are Incorrect:
A. Advanced Classification - This refers to custom classification properties, not DPL-based classification
B. External Devices - This is a classification category designation, not a classification method
C. Client Certificates - This is used for certificate-based identification, not DPL classification
E. Guest Registration - This is for guest management, not device classification via DPL
Update Process:
According to the documentation:​
"After a new version of the Device Profile Library is installed, it is recommended to run a policy that resolves classification properties. Due to classification profile changes in the new library version, some device classifications may change."
Before these changes are applied, administrators can review all pending changes and decide whether to apply them, modify existing policies first, or cancel the changes and roll back to a previous Device Profile Library version.
Referenced Documentation:
Forescout Device Profile Library Configuration Guide - February 2018​
About the Device Profile Library documentation​
Update Classification Profiles section​
What should you do first when preparing for an upgrade to a new CounterACT version?
Upgrade the members first before upgrading the EM.
Upgrading an appliance is done through Options/Modules.
From the appliance CLI, fstool upgrade /tmp/counteract-v8.0.1.fsp
Consult the CounterACT® Release Notes for the appropriate version
Upgrade only the modules compatible with the version you are installing.
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Upgrade Guides for multiple versions, the first thing you should do when preparing for an upgrade to a new CounterACT version is consult the CounterACT Release Notes for the appropriate version.​
Release Notes as First Step:
According to the official documentation:​
"Review the Forescout Release Notes for important information before performing any upgrade."
The documentation emphasizes this as a critical first step before any other upgrade activities.
What Release Notes Contain:
According to the upgrade guidance:​
The Release Notes provide essential information including:
Upgrade Paths - Which versions you can upgrade from and to
Pre-Upgrade Requirements - System requirements and prerequisites
End-of-Life Products - Products that must be uninstalled before upgrade
Non-Supported Products - Products not compatible with the new version
Module/Plugin Dependencies - Version compatibility requirements
Known Issues - Potential problems and workarounds
Upgrade Procedures - Step-by-step instructions
Rollback Information - How to revert if needed
Critical Pre-Upgrade Information:
According to the Release Notes guidance:​
"The upgrade process does not continue when end-of-life products are detected."
Release Notes list:
End-of-Life (EOL) Products - Must be uninstalled before upgrade
Non-Supported Products - Must be uninstalled before upgrade
Plugin Version Compatibility - Which plugin versions work with the new Forescout version
Upgrade Order vs. Release Notes Review:
According to the documentation:​
While the order of upgrade (EM first, then Appliances) is important, consulting Release Notes comes FIRST because it determines what needs to be done before any upgrade attempts.
The Release Notes tell you:
Whether you can upgrade at all
What must be uninstalled
System requirements
Compatibility information
Only AFTER reviewing Release Notes do you proceed with the actual upgrade sequence.
Why Other Options Are Incorrect:
A. Upgrade the members first before upgrading the EMÂ - This is the OPPOSITE of correct order; EM (Enterprise Manager) should be upgraded first
B. Upgrading an appliance is done through Options/Modules - This is not the upgrade path; upgrades are done through Tools > Options > CounterACT Devices
C. From the appliance CLI, fstool upgrade /tmp/counteract-v8.0.1.fsp - This is ONE possible upgrade method, but not the first step; downloading and reviewing Release Notes comes first
E. Upgrade only the modules compatible with the version you are installing - This is a consideration found IN the Release Notes, not the first step itself
Correct Upgrade Sequence:
According to the comprehensive upgrade documentation:​
text
1. FIRST: Review Release Notes (determine what's needed)
2. Second: Check system requirements
3. Third: Uninstall EOL/non-supported products
4. Fourth: Back up Enterprise Manager and Appliances
5. Fifth: Upgrade Enterprise Manager
6. Sixth: Upgrade Appliances
Referenced Documentation:
Before You Upgrade the Forescout Platform - v8.3​
Before You Upgrade the Forescout Platform - v9.1.2​
Forescout 8.1.3 Release Notes​
Installation Guide v8.0 - Upgrade section​
Which of the following best describes the 4th step of the basic troubleshooting approach?
Gather Information from the command line
Network Dependencies
Consider CounterACT Dependencies
Form Hypothesis, Document and Diagnose
Gather Information from CounterACT
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout troubleshooting methodology, the 4th step of the basic troubleshooting approach is "Form Hypothesis, Document and Diagnose". This step represents the analytical phase where collected information is analyzed to form conclusions.​
Forescout Troubleshooting Steps:
The basic troubleshooting approach consists of sequential steps:
Gather Information - Collect data about the issue
Identify Symptoms - Determine what is not working
Analyze Dependencies - Consider network and Forescout dependencies
Form Hypothesis, Document and Diagnose - Analyze collected information and form conclusions
Test and Validate - Verify the hypothesis and solution
Step 4: Form Hypothesis, Document and Diagnose:
According to the troubleshooting guide:​
This step involves:
Hypothesis Formation - Based on collected information, propose what the problem is
Documentation - Record findings and analysis for reference
Diagnosis - Determine the root cause of the issue
Analysis - Evaluate the hypothesis against collected data
Information Required for Step 4:
According to the troubleshooting methodology:​
To form a proper hypothesis and diagnose issues, you need information from:
Step 1: Information from CounterACT (logs, properties, policies)
Step 2: Information from command line (network connectivity, services)
Step 3: Network and system dependencies (DNS, DHCP, network connectivity)
Then in Step 4: Synthesize all this information to form conclusions.
Why Other Options Are Incorrect:
A. Gather Information from the command line - This is Step 2
B. Network Dependencies - This is part of Step 3 analysis
C. Consider CounterACT Dependencies - This is part of Step 3 analysis
E. Gather Information from CounterACTÂ - This is Step 1
Troubleshooting Workflow:
According to the documentation:​
text
Step 1: Gather Information from CounterACT
↓
Step 2: Gather Information from Command Line
↓
Step 3: Consider Network & CounterACT Dependencies
↓
Step 4: Form Hypothesis, Document and Diagnose ↠ANSWER
↓
Step 5: Test and Validate Solution
Referenced Documentation:
Lab 10 - Troubleshooting Tools - FSCA v8.2 documentation​
Congratulations! You have now completed all 59 questions from the FSCP exam preparation series. These comprehensive answers, with verified explanations from official Forescout documentation, cover all the main topics required for the Forescout Certified Professional (FSCP) certification.
Which type of endpoint can be queried for registry key properties?
Managed unknown endpoint
Unmanaged Windows endpoint
Managed Windows endpoint
Windows endpoint
Managed Linux endpoint
The Answer Is:
CExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide - Set Registry Key on Windows action, registry key properties can only be queried on "Managed Windows endpoints".​
Registry Key Property Requirements:
According to the Set Registry Key on Windows documentation:​
"Registry key properties can be queried on managed Windows endpoints only. The endpoint must be a Windows device that is managed (either via SecureConnector deployment or Remote Inspection with appropriate credentials)."
Managed vs. Unmanaged Endpoints:
According to the Windows Properties documentation:​
Managed Windows Endpoint -✓Can query registry keys
Has SecureConnector deployed, OR
Has Remote Inspection access via credentials, OR
Is domain-joined with appropriate permissions
Unmanaged Windows Endpoint -✗Cannot query registry keys
No agent or access method available
Registry cannot be accessed remotely
Why Other Options Are Incorrect:
A. Managed unknown endpoint - "Unknown" endpoints are not classified as Windows; classification unknown
B. Unmanaged Windows endpoint - Unmanaged endpoints have no access to registry
D. Windows endpoint - Must be "managed" to query registry; not all Windows endpoints are managed
E. Managed Linux endpoint - Linux systems don't have Windows registry
Registry Access Methods:
According to the documentation:​
Registry keys can be queried on Managed Windows endpoints using:
SecureConnector - Preferred method for interactive registry access
Remote Inspection (MS-WMI/RPC)Â - When credentials are configured
Domain Credentials - When endpoint is domain-joined
Referenced Documentation:
Set Registry Key on Windows - v9.1.4​
Set Registry Key on Windows - v8.5.2​
Windows Properties​
Which of the following is true regarding CounterACT 8 FLEXX Licensing?
CounterACT 8 can be installed on all CTxx and 51xx models.
Disaster Recovery is used for member appliances.
For member appliances, HA and Failover Clustering are part of Resiliency licensing.
Changing the licensing of the deployment from Per Appliance Licensing to FLEXX Licensing can be done through the Customer Portal.
Failover Clustering is used with EM and RM.
The Answer Is:
CExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Licensing and Sizing Guide and Failover Clustering Licensing Requirements documentation, the correct statement is: For member appliances, HA and Failover Clustering are part of Resiliency licensing.​
Resiliency Licensing for Member Appliances:
According to the Failover Clustering Licensing Requirements documentation:​
"To begin working with Failover Clustering, you need a license for the feature. The license required depends on which licensing mode your deployment is using."
When using FLEXX licensing with member appliances:
High Availability (HA)Â - Part of Resiliency licensing
Failover Clustering - Part of Resiliency licensing (called "eyeRecover License")
Disaster Recovery - Separate from member appliance resiliency
Resiliency License Components:
According to the documentation:​
"When using Flexx licensing, Failover Clustering functionality is supported by the Forescout Platform eyeRecover license (Forescout CounterACT Resiliency license)."
The Resiliency license covers:
For Member Appliances:
High Availability (HA) Pairing
Failover Clustering
For Enterprise Manager:
HA Pairing for EM
FLEXX Licensing Model:
According to the Licensing and Sizing Guide:​
"Flexx Licensing: Licenses are independent of hardware appliances, providing an intuitive and flexible way to license, deploy and manage Forescout products across your extended enterprise."
Why Other Options Are Incorrect:
A. Can be installed on all CTxx and 51xx models - FLEXX is for 5100/4100 series and later; CT series supports per-appliance licensing only
B. Disaster Recovery is used for member appliances - Disaster Recovery is separate; member appliances use HA/Failover Clustering from Resiliency license
D. Changing via Customer Portal - Changes from per-appliance to FLEXX must be done through official Forescout channels, not self-service Customer Portal
E. Failover Clustering is used with EM and RMÂ - Failover Clustering is for member appliances; EM has separate HA capability
Referenced Documentation:
Failover Clustering Licensing Requirements v8.4.4 and v9.1.2​
Forescout Licensing and Sizing Guide​
Switch from Per-Appliance to Flexx Licensing​
