3 Months Free Update
3 Months Free Update
3 Months Free Update
For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?
An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
When working with credential rotation/loosely connected devices, what additional CyberArk components are required?
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
Which threat intelligence source requires the suspect file to be sent externally?
An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.
What should the EPM Administrator do?