How to add an application to the Trusted Zone remotely
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.
Accept and close



Kaspersky Security Center 9


How to add an application to the Trusted Zone remotely

Back to "Host Management"
2013 Mar 01 ID: 7834

Kaspersky Security Center 9 allows an administrator to add software to the Trusted Zone remotely. This article explains remote administration of the Trusted Zone for Kaspersky Endpoint Security 8 for Windows.

Trusted Zone is a list of objects composed by an administrator. It contains objects not monitored by Kaspersky Anti-Virus. It is a list of exceptions for the protection scheme.

The Trusted Zone is edited via the policy for a particular group of Kaspersky Lab applications. To edit the Trusted Zone, open the General Protection Settings section in the properties of the policy for Kaspersky Endpoint Security 8 for Windows. Then click Settings in the Exclusions and trusted zone section.

There are two tabs in the Trusted Zone section: Exclusion rules and Trusted applications.

Trusted applications are the applications which you believe to be secure and do not want them to be checked by Kaspersky Endpoint Security 8 for Windows. When you choose an application, Kaspersky Endpoint Security 8 for Windows memorizes internal attributes of the executable file and uses them to identify the application as a trusted one during further checks. 

Click Add to add a trusted application into the list. Specify full path and actions which will not be monitored by Kaspersky Anti-Virus.

  • Do not scan opened files –  any files opened by the process of the trusted application will not be scanned. 
  • Do not monitor application activity – the Proactive Defense component will not scan any activity (even suspicious) of the trusted application. 
  • Do not inherit restrictions from the parent process (application) - if this option is enabled, Kaspersky Endpoint Security 8 for Windows monitors the application activity according to the rules set by the system administrator: application control rules for file activity, and network rules for network activity.
  • Do not monitor child application activity – all attempts to access system registry by the trusted application will not be scanned. 
  • Allow interaction with application interface – remote access applications (e.g., Remote Administrator), will be able to manage Kaspersky Endpoint Security 8 for Windows via the application interface.  
  • Do not scan network traffic – network traffic initiated by the trusted application will not be scanned. This exclusion does not affect network traffic scanning by the Firewall component which governs the analysis of the network activity of the given application. You can exclude from scanning either all network traffic of an application or only encrypted traffic (using SSL). Click the all link to change its value to encrypted. You can also limit the exclusion to a particular host/port. Click the any link to change it specified, and then specify the value of the remote host/port.

An exclusion rule is a set of conditions for excluding an object from scanning by Kaspersky Endpoint Security 8 for Windows.

Click Add to create a new rule.

An Object – is an exclusion of a particular object, folder, file(s) or a mask from scan.

The Rule description block allows configuring values for the selected exclusion types and choose Kaspersky Endpoint Security 8 for Windows components that should use that rule.

The following objects can be excluded from scanning: a file of a certain format, a file mask, an area (e.g. a folder or a program), processes of applications, objects according to Virus Encyclopedia classification (status assigned to the object by Kaspersky Anti-Virus during scanning). 

A threat type is the status assigned to an object by Kaspersky Endpoint Security 8 for Windows during scanning. The status is assigned according to malware and potentially dangerous software classification as listed in Kaspersky Lab Virus Encyclopedia. 


Was this information helpful?
Yes No


Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.