-If you have already onboarded to Microsoft Defender for Endpoint, you may have already configured exclusions in and for other security solutions on your devices. Or, if you are planning to onboard and use capabilities alongside another security solution, and you still need to set exclusions to avoid conflicts, see [Add Microsoft Defender for Endpoint to the exclusion list for your existing solution](/defender-endpoint/switch-to-mde-phase-2#step-3-add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution).
0 commit comments