You can configure Security Agents to skip scanning of trusted processes during Real-time Scan and event recording. After adding a program to the Trusted Program List, the Security Agent does not subject the program or any processes initiated by the program to Real-time Scan and event recording. Add trusted programs to the Trusted Program List to improve the performance of scanning on endpoints.
You can add files to the Trusted Program List if the following requirements are met:
-
The file is not located in the system directory.
-
The file has a valid digital signature.
After adding a program to the Trusted Program List, the Security Agent automatically excludes the program from the following:
-
Real-time Scan file checking
-
Real-time Scan process scanning
-
Event recording