While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?
- Add a new rule within the Access Protection policy to block port 21 and exclude the executable for the software.
- Put a new rule in the Exploit Prevention policy to include the executable for the software for additional protection.
- Exclude the process associated with the software within the On Access Scan policy's Low-Risk Processes section.
- Create an allow rule within the Rules policy for inbound/outbound on port 21 and the executable for the software.
Reveal Solution
Next Question