A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The ChiefInformation Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco's role has the `User Reporting` privilege enabled, but User Risk reporting is still not working.What is the probable reason that the User Risk Summary report is blank?
How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control?
A software company wants to protect its source code, including new source code created between scheduled indexing runs.Which detection method should the company use to meet this requirement?
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a `copy to USB device` operation?