We are slowly enabling Exploit Prevention rules by reviewing the Would Block events. Something I've noticed is that we are seeing Would Block events for files that we have already trusted in TIE. Does Exploit Prevention not check TIE reputations first?
Example of would block event (Details removed):
Analyzer Rule Name:Malware Behavior: Windows EFS abuse
User ran C:\trustedfile.exe, which accessed C:\ProgramData\Microsoft\directory, violating the rule "Malware Behavior: Windows EFS abuse". Access was allowed because the rule wasn't configured to block.