Views:

How to configure exclusions:
When you configure exclusions, always apply the principle that the more precise the exclusion, the smaller the potential security risk. For instructions to configure exclusions, see the "Preventing Threat Prevention from blocking trusted programs, networks, and services" section of the https://success.trendmicro.com/solution/KA-0009051