This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
The Trusted Program List does not support wildcards and environment
variables.
Go to Devices.
Select a desktop or server group.
Click Configure Policy.
The Configure Policy: <group name>
screen appears.
Click Trusted Program.
A new screen appears.
To exclude a program from suspicious file access activity
monitoring, type the full file path, using a specific file path,
and click Add to Trusted Program List.
<drive_name>:/<path>/<file_name>
Example
1: C:\Windows\system32\regedit.exe
Example
2: D:\backup\tool.exe
This prevents hackers from using program names in the exclusion
list but dropped in different file path to be executed.