An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.
What should the EPM Administrator do?
A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.
What should the EPM Administrator do?
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
An application has been identified by the LSASS Credentials Harvesting Module.
What is the recommended approach to excluding the application?