The Trusted Program List does not support wildcards and environment
variables.
Go to Devices.
Select a desktop or server group.
Click Configure Policy.
The Configure Policy: <group name>
screen appears.
Click Trusted Program.
A new screen appears.
To exclude a program from suspicious file access activity
monitoring, type the full file path, using a specific file path,
and click Add to Trusted Program List.
<drive_name>:/<path>/<file_name>
Example
1: C:\Windows\system32\regedit.exe
Example
2: D:\backup\tool.exe
This prevents hackers from using program names in the exclusion
list but dropped in different file path to be executed.