Similar to hash values, trusted certificates are made by the application vendors or
organizations to allow the agent to know which applications are trustworthy.
Trusted Certificates provides an import function allowing the
administrator to add new trusted certificates. The trusted certificates defined by
users
and the corresponding applications will be bypassed during scanning and will not be
blocked by Application Lockdown.
Views: