A. Forensic
B. Security Policies
C. Playbooks
D. Communication Control
A. A collector is used to change the reputation score of any application that collector runs
B. A collector records applications that communicate externally
C. A collector can quarantine unsafe applications from communicating
D. A collector blocks unsafe applications from running
A. The threat hunting module sends the user a notification to delete the file
B. The file is removed from the affected collectors
C. The threat hunting module deletes files from collectors that are currently online.
D. The file is quarantined