You can use the Exception Lists screen to configure Security Agents to skip scanning of trusted processes and to exclude detections of specified rules.
-
Rule Exceptions: Specify which detections to exclude using the rule ID. You can find rule IDs on the Log Query screen.
-
Trusted Program List: Specify trusted programs to skip when performing scans. For more information, see Configuring the Trusted Program List.