Configuring Trusted Program

  1. Navigate to Security Settings.
  2. Select a desktop or server group.
  3. Click Configure Settings.

    A new screen appears.

  4. Click Trusted Program.

    A new screen appears.

  5. To exclude a program from suspicious file access activity monitoring, type the full file path, using a specific file path, and click Add to Trusted Program List.


    Example 1: C:\Windows\system32\regedit.exe

    Example 2: D:\backup\tool.exe

    This prevents hackers from using program names in the exclusion list but dropped in different file path to be executed.

  6. Click Save.