View all questions & answers for the EPM-DEF exam
An application has been identified by the LSASS Credentials Harvesting Module.
What is the recommended approach to excluding the application?
In Agent Configurations, add the application to the Threat Protection Exclusions
Add the application to the Files to be Ignored Always in Agent Configurations.
Exclude the application within the LSASS Credentials Harvesting module.
Add the application to an Advanced Policy or Application Group with an Elevate policy action.
Submit