Processes Protected by the Default Policy

Traps protects many common processes on each supported operating system with the built-in exploit security policy. Changes to the list of protected processes are delivered with content updates. While you cannot change the processes that Traps protects, some exploit capabilities allow you to select from the protected processes. You can see the list of processes in the security capability when you Add a New Exploit Security Profile: To view which processes are protected by each capability, expand Protected Processes. To drill down or locate a specific process, use the search, or tab through the results.

Related Documentation