Viewing applications protected from exploits
When you view the list of applications, you can use the following button names to determine which applications are protected from exploits:
- The applications with an Exclude button beside their names are protected from evasive exploits.
- The applications with an Unexclude button beside their names are not protected from evasive exploits. You can protect the application by clicking the Unexclude button. See .
See Viewing detected exploit attempts.
From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List.
The list of protected applications displays.