An alert for a device running a proprietary application is tied to a vital business operation.
Which action is appropriate to take?
Which wildcard configuration applies a policy to all files and subfolders in a specific folder in Endpoint
Which statement should be used when constructing queries in Carbon Black Audit and Remediation, Live
How often do watchlists run?
An organization leverages a commonly used software distribution tool to manage deployment of enterprise software and updates. Custom rules are a suitable option to ensure the approval of files delivered by this tool.
Which other trust mechanism could the organization configure for large-scale approval of these files?