A. Ping the endpoint from the EPM server.
B. Restart the end point
C. On the end point, open a browser session to the URL of the EPM server.
D. Ping the server from the endpoint.
A. EPM Agent
B. EPM Discovery
C. EPM Server
D. EPM API
A. a separate license
B. a VDI advanced policy
C. A separate computer group
D. A separate set
A. Enable the Threat Protection policy only in Detect mode.
B. Do not enable the Threat Protection policy.
C. Enable the Threat Protection policy and configure the Policy Targets.
D. Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.
A. Policy Recommendations
B. Authorized Applications (Ransomware Protection)
C. Trusted Sources
D. Threat Intelligence
A. Create new advanced policies for each security tool.
B. Add any pre-existing security application to the Files to Be Ignored Always.
C. Add EPM agent to the other security tools exclusions.
D. EPM agent should never be run with any other security tools.