To configure settings to protect the memory of processes added to the list of protected processes, perform the following actions:
In the main window of the Web Console, select Devices → Policies & profiles.
Click the policy name you want to configure.
In the <Policy name> window that opens select the Application settings tab.
Select the Real-time computer protection section.
Click Settings in the Exploit Prevention subsection.
Open the Protected processes tab.
Click the Add button.
The Exploit prevention techniques window opens.
Specify the process name.
Select one of the options for applying impact reduction techniques:
Apply all available exploit prevention techniques.
If this option is selected, the list cannot be edited. By default, all available techniques are applied to a process.
Apply selected exploit prevention techniques.
If this option is selected, you can edit the list of impact reduction techniques applied:
Select the check boxes next to the techniques that you want to apply to protect the selected process.
Select or clear the Apply Attack Surface Reduction technique check box.
Configure settings for the Attack Surface Reduction technique:
Enter the names of the modules whose launch will be blocked from the protected process in the Deny modules field.
In the Do not deny modules if launched in the Internet Zone field, select the check boxes next to the options for which you want to allow modules to be launched:
Internet
Local intranet
Trusted URL
Restricted URL
Computer
These settings only apply to Internet Explorer®.
Click OK.
The process is added to the task protection scope.