How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control?
A software company wants to protect its source code, including new source code created between scheduled indexing runs.
Which detection method should the company use to meet this requirement?
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location?
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?