You can configure
Security Agents
to skip scanning of trusted processes during
Real-time Scan and event recording. After adding a program to the Trusted Program
List,
the
Security Agent
does not subject the program or any processes
initiated by the program to Real-time Scan and event recording. Add trusted programs
to
the Trusted Program List to improve the performance of scanning on endpoints.
Note
You can add files to the Trusted Program List if the following
requirements are met:
|
After adding a program to the Trusted Program List, the
Security Agent
automatically excludes the program from the following:
-
Real-time Scan file checking
-
Real-time Scan process scanning
-
Event recording