Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam EPM-DEF Topic 3 Question 37 Discussion

Actual exam question for CyberArk's EPM-DEF exam
Question #: 37
Topic #: 3
[All EPM-DEF Questions]

An application has been identified by the LSASS Credentials Harvesting Module.

What is the recommended approach to excluding the application?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Antonette
2 days ago
A) In Agent Configurations, add the application to the Threat Protection Exclusions? That's the way to go! Easy peasy lemon squeezy.
upvoted 0 times
...
Dorian
7 days ago
But wouldn't adding the application to an Advanced Policy or Application Group with an Elevate policy action be a better option?
upvoted 0 times
...
Hoa
10 days ago
I disagree, I believe we should add the application to the Threat Protection Exclusions in Agent Configurations.
upvoted 0 times
...
Dorian
12 days ago
I think the recommended approach is to exclude the application in the LSASS Credentials Harvesting module.
upvoted 0 times
...

Save Cancel