When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
When adding the EPM (Endpoint Privilege Manager) agent to a pre-existing security stack on a workstation, it is recommended to add any pre-existing security applications to the Files to Be Ignored Always to avoid conflicts and ensure smooth operation. Additionally, adding the EPM agent to the other security tools' exclusions list helps prevent interference from other security tools, thereby maintaining the overall security posture and compatibility.
The answers are A and B