If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
Which type of event does operation:1indicate in a SEDR database search?
Which type of security threat is used by attackers to exploit vulnerable applications?
Which type of communication is blocked, when isolating the endpoint by clicking on the isolate button in SEDR?
Which ICDm role is required in order to use LiveShell?
An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.
Which action should the administrator take to ensure that the desired setting is in place for the client?
Which device page should an administrator view to track the progress of an issued device command?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
What information is required to calculate storage requirements?