Important: Vulnerable applications are protected by default. You should be careful
when excluding applications from exploit prevention. They will still be protected by
CryptoGuard and Safe Browsing, see Turn exploit prevention on or off.
You can exclude applications from exploit prevention. You can also protect previously
excluded applications.
To exclude applications:
Check which exploit prevention policy is used by the group(s) of computers you
want to configure.
In the Policies pane, double-click Exploit
prevention. Then double-click the policy you want to change.
In the Exclusions tab of the Exploit
Prevention Policy dialog box, select the applications you want
to exclude in Protected Applications list and click
Exclude.
This moves the selected applications to the Excluded
Applications list
To protect previous excluded applications, select the applications you want to
include in Excluded Applications list and click
Include.