CyberArk EPM-DEF - CyberArk Defender - EPM
What can you manage by using User Policies?
What are the predefined application groups?
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
For Advanced Policies, what can the target operating system users be set to?
Which threat intelligence source requires the suspect file to be sent externally?