You can use the Exception Lists screen to configure Security Agents to skip scanning of trusted processes and to exclude detections of specified rules.
  • Rule Exceptions: Specify which detections to exclude using the rule ID. You can find rule IDs on the Log Query screen.
  • Trusted Program List: Specify trusted programs to skip when performing scans. For more information, see Configuring the Trusted Program List.