Views:

You can configure Security Agents to skip scanning of trusted processes during Real-time Scan and event recording. After adding a program to the Trusted Program List, the Security Agent does not subject the program or any processes initiated by the program to Real-time Scan and event recording. Add trusted programs to the Trusted Program List to improve the performance of scanning on endpoints.

Note:

You can add files to the Trusted Program List if the following requirements are met:

  • The file is not located in the system directory.

  • The file has a valid digital signature.

After adding a program to the Trusted Program List, the Security Agent automatically excludes the program from the following:

  • Real-time Scan file checking

  • Real-time Scan process scanning

  • Event recording