Exclude applications from exploit prevention
If you use role-based administration:
- You must have the Policy setting - exploit prevention right to configure an exploit prevention policy.
- You can't edit a policy if it is applied outside your active sub-estate.
For more information, see Managing roles and sub-estates.
Important Vulnerable applications are protected by default. You should be careful
when excluding applications from exploit prevention. They will still be protected by
CryptoGuard and Safe Browsing, see Turn exploit prevention on or off.
You can exclude applications from exploit prevention. You can also protect previously excluded applications.
To exclude applications: