When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
When deploying Ransomware Protection, it is important to add trusted software to the Authorized Applications (Ransomware protection) Application Group to ensure that legitimate applications are not incorrectly flagged as ransomware. Additionally, it is necessary to add additional files, folders, and/or file extensions to be included in Ransomware Protection to ensure that all critical data is being monitored and protected effectively.
The answers are A and C. https://docs.cyberark.com/EPM/Latest/en/Content/EPM/Server%20User%20Guide/PrivMgmnt-Ransomware-NewUI.htm