Exclude applications from exploit prevention

If you use role-based administration:

  • You must have the Policy setting - exploit prevention right to configure an exploit prevention policy.
  • You can't edit a policy if it is applied outside your active sub-estate.

For more information, see Managing roles and sub-estates.

Important Vulnerable applications are protected by default. You should be careful when excluding applications from exploit prevention. They will still be protected by CryptoGuard and Safe Browsing, see Turn exploit prevention on or off.

You can exclude applications from exploit prevention. You can also protect previously excluded applications.

To exclude applications:

  1. Check which exploit prevention policy is used by the group(s) of computers you want to configure.
  2. In the Policies pane, double-click Exploit prevention. Then double-click the policy you want to change.
  3. In the Application Exclusions tab of the Exploit Prevention Policy dialog box, select the applications you want to exclude in the Protected Applications list and click Exclude.
    This moves the selected applications to the Excluded Applications list.
  4. To protect applications that are currently excluded from checking, go to the Excluded Applications list, select the applications and click Include.
  5. Click OK.