An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
Which report template out format should an administrator utilize to generate graphical reports?
Which type of security threat is used by attackers to exploit vulnerable applications?
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
An endpoint fails to retrieve content updates.
Which URL should an administrator test in a browser to determine if the issue is network related?
Which alert rule category includes events that are generated about the cloud console?