4/124 questions · Unlock full access
Q1

A user downloads a PDF from the internet that contains a zero-day exploit. The Harmony Endpoint agent is configured with Threat Emulation and Threat Extraction. The policy for both is set to the 'Prevent' action. What is the expected sequence of events when the user attempts to open the file? ```mermaid sequenceDiagram participant User participant Endpoint Agent participant ThreatCloud participant Cleaned File User->>Endpoint Agent: Attempts to open PDF Endpoint Agent->>ThreatCloud: Sends file for analysis Note over ThreatCloud: Emulation & Extraction ThreatCloud-->>Endpoint Agent: ??? Endpoint Agent-->>User: ??? Endpoint Agent-->>Cleaned File: ??? ```

Q2

What communication protocol does Harmony Endpoint management use to communicate with the management server?

Q3

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Q4

Which information can we find on the Operational Overview dashboard?