Views:
The Trusted Programs List excludes programs and all child processes called by the program from Application Control, Behavior Monitoring, Device Control, Endpoint Sensor, and Real-time Scan.

Procedure

  1. When configuring a parent policy, specify how other users can configure child policies.
    • Inherit from parent: Child policies must use the settings configured in the parent policy
    • Extend from parent: Child policies can append additional settings to the settings inherited from the parent policy
      Note
      Note
      If your child policies Extend from parent, you can also configure Child Policy Restrictions. Restrictions prevent the child policy from adding specific objects to the list.
  2. Type the full program path of the program to exclude from the list.
  3. Click Add to Trusted Program List.
  4. To remove a program from the list, click the Delete icon.