An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
What does a ranged query return or exclude?
How does an administrator view all devices impacted by a suspicious file?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?