Important: Vulnerable applications are protected by default. You should be careful
when excluding applications from exploit prevention. They will still be protected by
CryptoGuard and Safe Browsing, see Turn exploit prevention on or off.
You can exclude applications from exploit prevention. You can also protect previously
To exclude applications:
Check which exploit prevention policy is used by the group(s) of computers you
want to configure.