![]() |
NoteThe Trusted Program List does not support wildcards and environment
variables.
|
Procedure
- Go to .
- Select a desktop or server group.
- Click Configure Policy.The Configure Policy: <group name> screen appears.
- Click Trusted Program.A new screen appears.
- To exclude a program from suspicious file access activity
monitoring, type the full file path, using a specific file path,
and click Add to Trusted Program List.
<drive_name>:/<path>/<file_name>
Example 1:C:\Windows\system32\regedit.exe
Example 2:D:\backup\tool.exe
This prevents hackers from using program names in the exclusion list but dropped in different file path to be executed. - Click Save.