Views:
Note
Note
The Trusted Program List does not support wildcards and environment variables.

Procedure

  1. Go to Devices.
  2. Select a desktop or server group.
  3. Click Configure Policy.
    The Configure Policy: <group name> screen appears.
  4. Click Trusted Program.
    A new screen appears.
  5. To exclude a program from suspicious file access activity monitoring, type the full file path, using a specific file path, and click Add to Trusted Program List.
    <drive_name>:/<path>/<file_name>
    Example 1: C:\Windows\system32\regedit.exe
    Example 2: D:\backup\tool.exe
    This prevents hackers from using program names in the exclusion list but dropped in different file path to be executed.
  6. Click Save.