Real-time device inspection reveals the device to be a managed and trusted device

Submits results to the TAC policy engine for privileged access.