You can configure the following additional application settings:
In this Help section
How to configure a proxy server
How to configure global exclusions
How to exclude process memory from scanning
How to configure the file operation interception mode
How to configure detection of applications that intruders can use to compromise devices or data
How to enable application stability monitoring
How to edit application startup settings
How to limit memory and CPU resource usage
How to limit resident memory usage
How to limit the number of Custom Scan tasks