An organization is troubleshooting a SONAR false positive and has created an exclusion for the in-house application generating the detection.
How can the organization use Process Explorer to verify that the exclusion works?
An organization would like to control the policies that the client uses when connecting over VPN, but wants to use a different set of policies in the office.
How should an administrator implement this?
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
An administrator needs to add an Application Exception. When the administrator accesses the Application Exception dialog window, applications fail to appear.
What is the likely problem?
Which tool should the administrator run before starting the Symantec Endpoint Protection Manager upgrade according to best practices?