You can configure Security Agents to skip scanning of trusted processes during
Real-time Scan and event recording. After adding a program to the Trusted Program
List,
the Security Agent does not subject the program or any processes
initiated by the program to Real-time Scan and event recording. Add trusted programs
to
the Trusted Program List to improve the performance of scanning on endpoints.
NoteYou can add files to the Trusted Program List if the following
requirements are met:
|
After adding a program to the Trusted Program List, the Security Agent
automatically excludes the program from the following:
-
Real-time Scan file checking
-
Real-time Scan process scanning
-
Event recording