Based on the policy configuration displayed in the exhibit, which of the following statements is true?
A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?
Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?