Which malware identification technique blocks all applications and processes from running, unless they are legitimate and appropriate software as determined by a security policy?
Which endpoint protection strategy uses system-level control of applications, processes, and hardware devices to prevent inappropriate software from running on a system?
An end-user has mistakenly copied sensitive data into an email and attempted to send it outside the company. The email is quarantined, and the user's immediate manager receives a notification detailing the policy violation. An additional notification is sent to IT Security, and an investigation is initiated. What does this scenario describe?