Collapse AllExpand All
  • ActiveAction [1]
  • ActiveX malicious code [1]
  • Behavior Monitoring Configuration Pattern [1]
  • Behavior Monitoring Core Service [1]
  • Behavior Monitoring Detection Pattern [1]
  • Behavior Monitoring Driver [1]
  • boot sector virus [1]
  • COM file infector [1]
  • Common Firewall Driver [1] [2]
  • components [1]
  • Conflicted ARP [1]
  • contacting [1] [2] [3] [4] [5]
    • documentation feedback [1]
    • Knowledge Base [1]
    • sending suspicious files [1]
    • Trend Micro [1] [2] [3]
  • conventional scan [1]
  • Damage Cleanup Engine [1]
  • Damage Cleanup Services [1]
  • Device Control [1]
  • Digital Signature Pattern [1]
  • documentation feedback [1]
  • Early Boot Clean Driver [1]
  • EICAR test script [1]
  • EXE file infector [1]
  • external device protection [1]
  • Fragmented IGMP [1]
  • HTML virus [1]
  • IDS [1]
  • IntelliTrap Exception Pattern [1]
  • IntelliTrap Pattern [1]
  • Intrusion Detection System [1]
  • Java malicious code [1]
  • JavaScript virus [1]
  • joke program [1]
  • Knowledge Base [1]
  • LAND Attack [1]
  • macro virus [1]
  • network virus [1]
  • new features [1]
  • OfficeScan
    • key features and benefits [1]
  • OfficeScan agent
    • connection with OfficeScan server [1]
  • Overlapping Fragment [1]
  • packer [1]
  • Ping of Death [1]
  • Plug-in Manager [1]
  • Policy Enforcement Pattern [1]
  • probable virus/malware [1]
  • programs [1]
  • rootkit [1]
  • rootkit detection [1]
  • Security Information Center [1]
  • security risks [1] [2] [3] [4] [5] [6] [7]
  • smart scan [1]
  • spyware/grayware [1] [2] [3] [4] [5] [6] [7]
    • adware [1]
    • dialers [1]
    • hacking tools [1]
    • joke programs [1]
    • password cracking applications [1]
    • remote access tools [1]
    • spyware [1]
  • Spyware Active-monitoring Pattern [1]
  • Spyware Pattern [1]
  • Spyware Scan Engine [1]
  • suspicious files [1]
  • SYN Flood [1]
  • Teardrop [1]
  • test virus [1]
  • Tiny Fragment Attack [1]
  • Too Big Fragment [1]
  • TrendLabs [1]
  • Trend Micro
    • Knowledge Base [1]
    • Security Information Center [1]
    • TrendLabs [1]
  • Trojan horse program [1] [2] [3] [4]
  • URL Filtering Engine [1]
  • VBScript virus [1]
  • virus/malware [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14]
  • Virus Cleanup Engine [1]
  • Virus Cleanup Template [1] [2]
  • Virus Encyclopedia [1]
  • Virus Pattern [1]
  • Virus Scan Engine [1]
  • web reputation [1]
  • worm [1]

Configuring the Trusted Program List Parent topic

You can configure OfficeScan to skip scanning of trusted processes during Real-time and Behavior Monitoring scans. After adding a program to the Trusted Programs List, OfficeScan does not subject the program or any processes initiated by the program to Real-time Scan. Add trusted programs to the Trusted Program List to improve the performance of scanning on endpoints

Procedure

  1. Click the Settings button (icon_settings.jpg) on the main console.
  2. On the Protection tab, select Trusted Program List from the drop-down menu.
  3. Click Browse... to locate the program to add to the Trusted Program List.
  4. Click Add to Trusted Program List.
  5. Click OK.