You can exclude IP addresses, process names, or folders from threat mitigation if these items are not vulnerable to threats or are already adequately protected. Add up to 128 mitigation exceptions.
Note: Endpoints listed in the Mitigation Exceptions screen can be queried but you cannot deploy a custom pattern, run cleanup, or launch On-demand Scan on these endpoints.