Yes. The IM/P2P application is not a "helper" or proxy. It uses the same tool as Intrusion Protection to identify traffic and then allows you to log or block the traffic. If you don't want to log or block any IM/P2P traffic, leave the application disabled.
Yes. The IM/P2P application is not a "helper" or proxy. It uses the same tool as Intrusion Protection to identify traffic and then allows you to log or block the traffic. If you don't want to log or block any IM/P2P traffic, leave the application disabled.