To stop third-party products from interfering with isolation, certain exclusions need to be created on the system so that isolation processes and binaries are whitelisted. The absence of exclusions may result in failed isolation initialization and slow or blocked browsing and opening of untrusted documents. To create exclusions, refer to your third-party product documentation. Necessary actions may consist of excluding all isolation processes and binaries from the third-party endpoint security product. The following information discusses general guidelines for creating exclusions for third-party endpoint security products so that they do not interfere with or prevent the normal operation of isolation. Open topic with navigation Third-party Product Exclusions Overview
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |