View all questions & answers for the EPM-DEF exam
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
Add any pre-existing security application to the Files to Be Ignored Always.
Add EPM agent to the other security tools exclusions.
EPM agent should never be run with any other security tools.
Create new advanced policies for each security tool.
Submit