You can. Either by whitelisting the host altogether (with a "trust" rule) or else by specifying an access control policy rule just for that host whereby you go in and override the Intrusion policy or specific signatures within the policy for that host.