Exclude applications from exploit prevention

If you use role-based administration:

For more information, see Managing roles and sub-estates.

Important: Vulnerable applications are protected by default. You should be careful when excluding applications from exploit prevention. They will still be protected by CryptoGuard and Safe Browsing, see Turn exploit prevention on or off.

You can exclude applications from exploit prevention. You can also protect previously excluded applications.

To exclude applications:

  1. Check which exploit prevention policy is used by the group(s) of computers you want to configure.
  2. In the Policies pane, double-click Exploit prevention. Then double-click the policy you want to change.
  3. In the Exclusions tab of the Exploit Prevention Policy dialog box, select the applications you want to exclude in Protected Applications list and click Exclude.
    This moves the selected applications to the Excluded Applications list
  4. To protect previous excluded applications, select the applications you want to include in Excluded Applications list and click Include.
  5. Click OK.