What type of policy provides a second layer of defense, after the Symantec firewall?
What happens when an administrator adds a file to the deny list?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?