The Exploit Prevention component protects several processes by default. You can exclude the processes from the protection scope by clearing the corresponding check boxes in the list.
To add a process to the list of protected processes:
A Microsoft Windows Explorer window opens.
The process name is displayed in the line.
The process will be added to the list of protected processes.
The Exploit prevention techniques window opens.
If this option is selected, the list cannot be edited. By default, all available techniques are applied to a process.
If this option is selected, you can edit the list of impact reduction techniques applied:
These settings only apply to Internet Explorer®.
The process is added to the task protection scope.
Page top