Using Include/Exclude tables


This section describes how to use include/exclude tables to determine whether an application is intercepted and whether the application data streams are optimized. This section also describes how to create and modify tables.

For an overview of this method, see Include-Exclude-tables.

This section provides information about the following topics:

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*